10/253 questions · Unlock full access
Q1

A financial institution is implementing a new secure messaging system. The primary requirement is that if the long-term private key of a recipient is compromised, an attacker should not be able to decrypt past messages that were sent to that recipient. Which cryptographic property must the key exchange protocol implement to meet this requirement?

Q2

A developer is implementing AES encryption for a system that transmits large video files. Due to potential packet loss on the network, a requirement is that the corruption of a single ciphertext block must not affect the decryption of subsequent blocks. Additionally, the encryption process for different blocks should be parallelizable to improve performance. Which block cipher mode of operation should be selected?

Q3Multiple answers

A security analyst is investigating a data breach where password hashes were exfiltrated. The hashes were generated using a standard MD5 algorithm without any additional security measures. The analyst plans to use precomputed hash values to crack the passwords. Which of the following attack methods is the analyst employing? (Select TWO)

Q4

True or False: The primary purpose of the S-box (Substitution-box) within a Feistel network-based block cipher like DES is to provide the property of diffusion.

Q5

A government agency needs to select a post-quantum cryptography algorithm for securing classified communications. Their primary concern is establishing a shared secret over an insecure channel, which must be resistant to attacks from future quantum computers. They are evaluating the candidates from the NIST Post-Quantum Cryptography (PQC) standardization process. Which of the following algorithms is specifically designed for Key Encapsulation Mechanisms (KEM) and has been selected by NIST as a primary standard for this purpose?

Q6

The command to generate a new 4096-bit RSA private key using OpenSSL and save it to a file named `server.key` is `openssl genrsa -out server.key _____`. Which value correctly completes the command?

Q7

A cryptographer is analyzing an ancient cipher where each letter of the alphabet is consistently replaced by another single letter. For example, every 'A' becomes a 'Q', every 'B' becomes an 'X', and so on. The cryptographer successfully breaks the cipher by analyzing the frequency of letters in the ciphertext and comparing it to the known frequency of letters in the English language. What type of cipher is being analyzed?

Q8

A security team is configuring a site-to-site VPN using IPsec. They need to decide which mode to use. The goal is to encrypt the entire original IP packet, including the IP headers, and then encapsulate it within a new IP packet for transmission across the public network. This provides the highest level of security by hiding the original source and destination IP addresses from network eavesdroppers. Which IPsec mode should be used? ```mermaid graph TD subgraph Original_Packet IP_Header TCP_Header Data end subgraph Encapsulated_Packet New_IP_Header IPsec_Header Encrypted_Original_Packet end Original_Packet -->|Encapsulation| Encrypted_Original_Packet ```

Q9

A developer is choosing a hash function for a new application that requires high resistance to collision attacks. Which of the following algorithms has known practical collision attacks and should be avoided for this purpose?

Q10

When comparing RSA and Elliptic Curve Cryptography (ECC) for implementing public-key encryption, what is the primary advantage of using ECC?