Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

Unit 2 and 8

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the Web site. The two hashes match. What do you know about the file

Your copy is the same as the copy posted on the website.

Which of the following is the strongest hashing algorithm


Which of the following best describes high amplifications when applied to hashing algorithms

A small change in the message results in a big change in the hash value.

Which of the following is the weakest hashing algorithm


When two different messages produce the same hash value, what has occurred


Hashing algorithms are use to perform what activity

Create a message digest

Your company system is a participant in an asymmetric cryptography system. You've crafted a message to be sent another user. Before transmission, you hash the message, then encrypt the hashing using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide


Which of the following is used to verify that a downloaded file has not been altered


By definition, which security concept uses the ability to prove that a sender sent an encrypted message


You create a new document and save it to a hard drive on a file server on your company's network. Then, you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing what security goal


By definition, which security concept ensures that only authorized parties can access data


What is the cryptography mechanism which hides secret communications within various forms of data


Which of the following encryption methods combines a random value with the plaintext to produce the cipher text

One-time pad

By definition, which security concept uses the ability to prove that a sender sent an encrypted message


Which of the following is not a valid example of steganography

Encrypting a data file with an encryption key

When a cryptographic system is used to protect confidentiality of data, what is actually protected

Unauthorized users are prevented from viewing or accessing the resource.

What form of cryptography is best suited for bulk encryption because it is so fast

Symmetric key cryptography

Which of the following is not true concerning symmetric key cryptography

Key management is easy when implemented on a large scale.

Which of the following algorithms are used in symmetric encryption (Select three.)

Blowfish, AES, 3DES

What type of key or keys are used in symmetric cryptography

A shared private key

Which of the following is the weakest symmetric encryption method


You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible


How many keys are used with symmetric key cryptography


Which of the following is used for secure exchange of symmetric encryption keys


Which of the following algorithms are used in asymmetric encryption (Select two.)

Diffie-Hellman, RSA

Which of the follow are characteristics of ECC (Select two.)

Asymmetric encryption, Uses a finite set of values within an algebraic field.

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to the verify the integrity of the transmission

Sender's public key

How many keys are used with asymmetric or public key cryptography


Above all else, what must be protect to maintain the security and benefit of a asymmetric cryptographic solution, especially if it is widely used for digital certificates

Private keys

In the certificate authority trust model known as hierarchy, where does trust start

Root CA

Which aspect of certificates makes them a reliable and useful mechanism for providing the identity of a person, system, or service on the Internet

Trusted third-party

Which of the following is the employment of two separate key pairs in order to separate the security functions of confidentiality and integrity in a communication system

Dual key pair

Certificates can be invalidated by the trusted third-party that originally issued the certificate. What is the name of the mechanism that is used to distribute information about invalid certificates


A PKI is a method for managing which type of encryption


Which of the following protocols are most likely used with digital signatures (Select two.)


Which of the following defines a method for one CA hierarchy to accept certificates issued by another CA hierarchy

Trusted model

What is the purpose of key escrow

To provide a means to recover from a lost private key

Which of the following is an entity that accepts and validates information contained within a request for certificate

Registration authority

What is a PKI

A hierarchy of computers for issuing certificates

What is the most obvious means of providing non-repudiation in a cryptography system

Digital signatures

Which of the following items are contained in a digital certificate

Validity period, public key

Which of the following identifies someone who can retrieve private keys from storage

Recovery agent

Which of the following generates the key pair used in asymmetric cryptography


Which of the following conditions does not result in a certificate being added to the certificate revocation list

Certificate expiration

Which of the following is a direct protection of integrity

Digital signature

In what form of key management solution is key recovery possible


Which of the following would you find on a CPS

A declaration of security that the organization is implementing for all certificates

Which of the following best describes the content of the CRL

A list of all revoked certificates

Which of the following defines a method for one CA hierarchy to accept certificates issued by another CA hierarchy

Trusted model

Certificate revocation should occur under all but which of the following conditions

The certificate owner has held the certificate beyond the established lifetime timer

Which of the following security measures encrypts the entire contents of a hard drive

Drive Lock

You want to protect data on hard drives for users with laptops. You want to drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Implement BitLocker with a TPM

To obtain a digital certificate and participate in a Public Key Infrastructure (PKI), what must be submitted and where should it be submitted

Identify data and a certification request to the registration authority (RA)

You want to implement BitLocker to encrypt data on a hard disk even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do

Enable the TPM in the BIOS

You have lost the private key that you have used to encrypt files. You need to get a copy of the private key to open some encrypted files. Who should you contact

Recovery agent

Which of the following would require that a certificate be placed on the CRL

The private key is compromised.

Which of the following is the best countermeasure for man-in-the-middle attacks

Public Key Infrastructure (PKI)

What action is taken when the private key associated with a digital certificate becomes compromised

The certification is revoked and added to the Certificate Revocation List

When a sender encrypts a message using their own private key, what security service is being provided to the recipient


You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which solution would you choose


A private key has been stolen. What action should be taken to deal with this crisis

Add the digital certificate to the CRL

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature

Mary's private key

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Key escrow

Which of the following statements is true when comparing symmetric and asymmetric cryptography

Asymmetric key cryptography is used to distribute symmetric keys.

What technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large complex environments

Online Certificate Status Protocol

You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server

Obtain a certificate from a public PKI

Mary wants to send a message to Sam so the only Sam can read it. Which key would be used to encrypt the message

Sam's public key

An SSL client has determined that the Certificate Authority (CA) issuing a server's certificate is on its list of trusted CAs. What is the next step in verifying the server's identity

The CA's public key must validate the CA's digital signature on the server certificate

What is the main function of a TPM hardware chip

Generate and store cryptographic keys

You used BitLocker to encrypt the hard drive of a laptop. The laptop stores the startup key in the TPM, and a PIN is also required to start the system. Because of a hardware failure, the system will not boot. You want to gain access to the data on the hard drive. What should you do

Move the hard drive to another system. Use the recovery key to unlock the disk.

When a sender encrypts a message using their own private key, what security service is being provided to the recipient


When protection of the content of a message is required, which of the following cryptography solution should be employed

Symmetric encryption

Which of the following security would prevent a user from reading a file which she did not create


Which of the following functions are performed by the TPM

Create a hash of system components

Which of the following network layer protocols provides authentication and encryption services of IP based network traffic


Which protocol is used for securely browsing a Web site


Which IPSec sub protocol provides data encryption

Encapsulating Security Payload (ESP)

You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure the other cannot see your credit card number on the Internet


Which of the following can be used to encrypt Web, e-mail, telnet, file transfer, and SNMP traffic

IPSec (Internet protocol security)

Which of the following technologies is based upon SSL (Secure Socket Layer)

TLS (Transport Layer Security)

Which of the following is the best countermeasure against man-in-the-middle attacks


You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.


Which of the following protocols can TLS for key exchange (Select two.)

RSA, Diffie- Hellman

Telnet is inherently insecure its communications is in plain text and easily intercepted. Which of the following is an acceptable alternative to Telnet


Which protocol does HTTPS use to offer greater security in Web transactions


IPSec is implemented through two separate protocols. What are these protocols called (Select two.)


The session keys employed by SSL (Secure Socket Layer) are available in what bit lengths

128 bit and 40 bit

What s the primary function of the IKE protocol use with IPSec

Create a security association between communicating partners

Which of the following protocols are often added to other protocols to provide secure transmission of data


Which of the following protocols can be used to securely manage a network device from a remote connection


Which protocol is used for securely browsing a Web site


Which of the following is defined as a contract which prescribes the technical support or business parameters that a provider will bestow to its clients

Service level agreement

What is the most effective means of improving or enforcing security in any environment

User awareness training

Which type of media preparation is sufficient for media that will be reused in a different security context within your organization


You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them through a local liquidator. Computers were previously not used for storing sensitive information. What should you do prior to getting rid of the computers

Sanitize the hard drives

Which of the following activities assigns a security level to different types of data

Information classification

Which of the following is not part of security awareness training

Employee agreement documents.

As you are helping a user with a computer problem you notice that she has written her password on a note stuck to her computer monitor. You check the password policy of your company and find that the following settings are currently required: ...........Which of the following is best action to take to make remember passwords easier so that she no longer has to write the password down

Implement end-user training

A service level agreement (SLA) defines the relationship between, and the contractual responsibilities of providers and recipients of service. Which of the following characteristics are most important when designing an SLA (Select two)

Clear and detailed description of penalties if the level of service is not provided. Detailed provider responsibilities for continuity and disaster recovery mechanisms.

Which of the following defines an acceptable use agreement

An agreement which identifies the employees rights to use company property such as Internet access and computer equipment for personal use.

When developing the totality of security policy documentation, what type of document will contain instructions or information on remaining compliance with regulations and industry standards


Over the last month you have noticed a significant increase in the occurrence of inappropriate activities performed by employees. What is the best first response step to take in order to improve or maintain the security level of the environment

Improve and hold new awareness sessions

Which of the following is not an example of a service level agreement

Security policy design

When informing an employee that they are being terminated, what is the most important activity

Disabling their network access

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach


Which of the following are typically associated with human resource security policies (Select two)

Termination, Background checks

Which of the following is not used to oversee and/or improve the security performance of employees

Exit interviews

A code of ethics provides for all but which of the following

Clearly defines course of action to take when a complex issue is encountered.

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs


What is the primary countermeasure to social engineering


What is the primary purpose of forcing employees to take mandatory on-week minimum vacations every-year

To check for evidence of fraud

What is the most common failure of a security policy in an environment

Lack of user awareness

Which of the following is a policy that defines appropriate activities and usage for company resources, assets, and communications

Acceptable use policy

Who is responsible for performing the steps of the business continuity plan or disaster recovery plain in the event of an emergency

Recovery team

A disaster recovery plan should include all but which of the following

Penetration testing

When a recovery is being performed due to a disaster, what services are to be stabilized first

Mission critical

In business continuity planning, what is the primary focus of the scope

Business processes

What is the primary goal of business continuity planning

Maintaining business operations with reduced or restricted infrastructure capabilities or resources

Which of the following network strategies connects multiple servers together such that if one server fails, the others immediately take over its tasks, preventing a disruption in service


Which of the following disk configurations can sustain a loss of any two disks

RAID 1+0

You manage the website for your company. The Web 1 server hosts the website. This server has the following configuration:..........Which component is a single point of failure for the website

Disk Controller

What is an advantage of RAID 5 over RAID 1

RAID 5 improves performance over RAID 1

To prevent server downtime, which of the following components should be installed redundantly in a server system

Power supply

You have a computer with three hard disks.............Disk 2 fails. Which of the following is true

Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.

When returning to the rebuilt primary site, the salvage team will restore or return what process first.

Least business-critical

Daily backups are done at the ABD company location and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using

Warm site

Which of the following is a recovery site that may have electricity connected, but there are no servers installed and no high-speed data lines present

Cold site

You manage a Web site for your company. The Web site three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure

Website storage

You manage the website for your company. The website uses clusters of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this

Connect one server through a different ISP to the Internet.

What is the primary security feature that can be designed into a network's infrastructure to protect and support availability


If your mission critical services have a maximum tolerable downtime (MTD) (or a recovery time objective (RTO)) of 36 hours, what would be the optimum form of recovery site you should choose


Which form of alternate site is the cheapest but my not allow an organization to recover before reaching their maximum tolerable downtime

Reciprocal agreement

You have been asked to implement a RAID 5 solution for RAID 5 solution for your network. What is the minimum number of hard disks that can be used to configure RAID 5


Which of the following drive configuration is fault tolerant


When should a hardware device be replaced in order to minimize downtime

Just before it's a MTBF is reached

You have been asked to deploy a network solution that requires an alternate location where operational recovery is provided within minutes of a disaster. Which of the following strategies would you choose

Hot site

To increase your ability to recover from a disaster, where should you store backup tapes

At the vice president's home

Which of the following are backed up during an incremental backup

Only files that have changed since the last full or incremental backup.

What does a differential backup do during the backup

Back up all files with the archive bit set; does not reset the archive bit

Your network uses the following backup strategy: full backup every Sunday night, Incremental backups Monday through Saturday nights. Thursday morning the storage system fails. How many restore operations will you need to perform to recover all the data


Your network performs a full back every night. Each Sunday, the previous night's backup tape is archived. Wednesday morning the storage system fails. How many restore operations will you need to perform to recover all the data


A system failure has occurred. Which of the following restoration process would result in the fastest restoration of all data t its most current state

Restore the full backup and the last differential backup.

You organization uses the following tape rotation strategy for its backup tapes: 1. The first set of tapes is used for daily backups 2. At the end of each week, the latest daily backup tape is promoted to be the weekly backup tape 3. At the end of the each month, one of the weekly backup tapes is promoted to be the monthly backup tape. What kind of backup ration strategy is being used


Even if you perform regular backups, what must be done to ensure that you are protected against data loss

Regularly test restoration procedures

Which backup strategy backsup all files from a computer's file system regardless of whether the file's archive bit is set or not and marks them as having been backed up


What does an incremental backup do during the backup

Backs up all file with the archived bit set; resets the archive bit.

Why should backup media be stored offsite

To prevent the same disaster from affecting the both network and the backup media.

Which of the following are backed up during a differential backup

Only file that have changed since the last full backup.

The disaster recovery plan calls for having tape backups stored at a different location. The location is a safe deposit box at the local back. Because of this, the disaster recovery plan specifies to choose a method that uses the fewest tapes, but is also quick to back up and restore files. Which backup strategy would best meet the disaster recovery plan for tape backups

Perform a full backup once a week with a differential backup the other days of the week.

See more

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording