The private key in asymmetric cryptography must be:
A. Kept secret to maintain security
B. Shared with everyone
C. Rotated weekly
D. Used for encryption only
A. Kept secret to maintain security
Which attack targets password hashes using precomputed tables?
A. Brute force
B. Side channel
C. Rainbow table
D. Dictionary poisoning
C. Rainbow table
Which term describes the process of exchanging public keys securely?
A. Key exchange
B. Key destruction
C. Key renewal
D. Certificate chaining
A. Key exchange
Which model enforces access by a central authority and uses data classification labels?
A. RBAC
B. DAC
C. MAC
D. Hybrid
C. MAC
Which algorithm is commonly used for secure key exchange but does not encrypt data?
A. RSA
B. ECC
C. Diffie-Hellman
D. SHA-256
C. Diffie-Hellman
Which of the following protocols uses cryptography to secure web traffic?
A. HTTPS
B. FTP
C. Telnet
D. SNMP
A. HTTPS
What caused the 2011 DigiNotar breach?
A. Hardware failure
B. Poor password protocols and unpatched servers
C. Expired certificates
D. Network congestion
B. Poor password protocols and unpatched servers
Which model gives control to the object’s owner?
A. DAC
B. RBAC
C. MAC
D. Mandatory hybrid
A. DAC
Digital signatures provide:
A. Encryption and decryption
B. Authentication, integrity, and non-repudiation
C. Confidentiality only
D. Compression
B. Authentication, integrity, and non-repudiation
SSH is primarily used for:
A. Email encryption
B. File compression
C. Secure remote login and administration
D. Wireless authentication
C. Secure remote login and administration
Authorization determines:
A. Identity of the user
B. Password complexity
C. What resources the user can access
D. The encryption key length
C. What resources the user can access
A government system that uses clearance levels but allows personal file sharing likely uses:
A. RBAC
B. Hybrid (MAC + DAC)
C. Discretionary only
D. No access control
B. Hybrid (MAC + DAC)
A hash function produces:
A. Variable-length encrypted text
B. Fixed-length output from any input
C. Random numbers
D. Two-way reversible data
B. Fixed-length output from any input
IPsec protects data at which layer of the OSI model?
A. Application
B. Network
C. Session
D. Transport
B. Network
Accounting in access control involves:
A. Assigning user roles
B. Logging and auditing user actions
C. Encrypting audit trails
D. Resetting passwords
B. Logging and auditing user actions
Data exfiltration means:
A. Securely deleting data
B. Stealing or exporting data from an organization
C. Accidental data entry
D. Data compression
B. Stealing or exporting data from an organization
Which of the following is not a property of a secure hash function?
A. Deterministic
B. Collision-resistant
C. One-way
D. Reversible
D. Reversible
What is the function of a Certificate Authority (CA)?
A. Encrypts all user passwords
B. Manages VPN connections
C. Issues and revokes digital certificates
D. Stores private keys
C. Issues and revokes digital certificates
Which access control model assigns permissions based on user roles?
A. RBAC
B. DAC
C. MAC
D. Hybrid
A. RBAC
Data manipulation attacks:
A. Subtly alter data for malicious purposes
B. Encrypt data to lock users out
C. Exfiltrate large data sets
D. Overwrite disk sectors
A. Subtly alter data for malicious purposes