Get IT Security: Defense Against The Digital Dark Arts Graded Quiz Answers
Table of Contents
Q1. The logic used to convert plaintext into ciphertext is called a(n) ______.
Answer: encryption algorithm
Explanation: An encryption algorithm is a mathematical formula used to convert plaintext into ciphertext, ensuring secure communication by making the data unreadable without decryption.
Q2. DES, RC4, and AES are examples of ______ encryption algorithms.
Answer: symmetric
Explanation: DES, RC4, and AES are symmetric encryption algorithms that use the same key for encryption and decryption, making them efficient for encrypting large amounts of data.
Q3. Fill in the blank: To create a public key signature, use the ______ key.
Answer: private
Explanation: A private key is used to create a digital signature, which can then be verified by others using the corresponding public key.
Q4. In which of the following scenarios is asymmetric encryption better than symmetric encryption? Select all that apply.
Answer:
You need a digital signature for message verification.
Communications may take place over untrusted networks.
Explanation:
Asymmetric encryption is suitable for scenarios requiring secure communication over untrusted networks and for creating digital signatures. It uses a public and private key pair, reducing the need to share secret keys.
Q5. Of the following options, which are true of an ideal hash function? Select all that apply.
Answer:
It maps any amount of data to an output of fixed size.
They are deterministic.
Explanation:
An ideal hash function generates a fixed-size output regardless of input size and is deterministic, meaning the same input always produces the same hash. It should also exhibit properties like avalanche effect (small input changes causing significant output changes) but not allow plaintext recovery.
Q6. Which of the following strategies can make passwords and password hashes stronger and more difficult for hackers to use?
Answer:
Use passwords that are known to be strong.
Running passwords through the hashing function multiple times.
Using randomly chosen and large password salts.
Explanation:
Strong passwords, hashing iterations, and unique salts enhance password security by increasing the complexity of brute-force and precomputed hash attacks.
Q7. Which of the following benefits does TLS provide?
Answer:
A secure communication line.
Checks to ensure messages aren’t lost or altered.
The ability to authenticate both parties communicating.
Explanation:
TLS (Transport Layer Security) ensures secure communication, data integrity, and authentication but cannot guarantee invulnerability to all attacks.
Q8. ____ is a system that defines the creation, storage, and distribution of digital certificates.
Answer: PKI
Explanation: Public Key Infrastructure (PKI) manages the creation, storage, and distribution of digital certificates and public-private key pairs for secure communications.
Q9. You’re a consultant and you want your clients to be able to send you important documents in a secure manner. You decide to use RSA key pairs to accomplish this. What should you share with your clients?
Answer: your public key
Explanation: By sharing your public key, clients can encrypt documents for you. Only your private key can decrypt the messages, ensuring confidentiality.
Q10. You want to use a hash digest to verify that the text file secret_text.txt
is not modified. Your public key is my_public_key.pem
and your private key is my_private_key.pem
. Which command do you use to create the hash digest?
Answer: openssl dgst -sha256 -sign my_private_key.pem -out secret_text.txt.sha256 secret_text.txt
Explanation: To create a hash digest and sign it, use your private key (my_private_key.pem
). The openssl dgst -sha256 -sign
command creates the hash and signs it for verification.
Get IT Security: Defense Against The Digital Dark Arts Practice Quiz Answers >>
Get Module 01 Challenge: Understanding Security Threats Quiz Answers
Module 02 Challenge: Pelcgbybtl (Cryptology) Graded Quiz Answers