-
web.groovymark@gmail.com
- November 29, 2024
Question 41
Which of the following describes a side-channel attack?
a) The attacker uses timing information to infer the encryption key
b) The attacker intercepts and decrypts data during transmission
c) The attacker manipulates the encryption algorithm
d) The attacker uses brute-force attempts to guess the key
Correct Answer: a) The attacker uses timing information to infer the encryption key
Explanation: In a side-channel attack, the attacker gathers information from the physical implementation of the cryptosystem, such as timing or power consumption, to infer the encryption key.
Question 42
What is the role of a Certificate Authority (CA) in public key infrastructure?
a) To generate encryption keys
b) To issue and manage digital certificates
c) To encrypt data for secure transmission
d) To store private keys securely
Correct Answer: b) To issue and manage digital certificates
Explanation: A Certificate Authority (CA) is responsible for issuing, managing, and validating digital certificates used in public key infrastructure (PKI).
Question 43
Which type of attack involves analyzing the frequency of letters in a ciphertext to crack the encryption?
a) Brute-force attack
b) Replay attack
c) Frequency analysis attack
d) Man-in-the-middle attack
Correct Answer: c) Frequency analysis attack
Explanation: A frequency analysis attack involves analyzing the frequency of letters or symbols in ciphertext to deduce the underlying plaintext or encryption key.
Question 44
What is the primary function of a Trusted Platform Module (TPM)?
a) To store encryption keys securely
b) To generate digital certificates
c) To encrypt data for transmission
d) To manage public key infrastructure
Correct Answer: a) To store encryption keys securely
Explanation: A TPM is a hardware component that securely stores cryptographic keys and ensures they are protected from unauthorized access.
Question 45
Which of the following describes a digital signature?
a) It encrypts a message for secure transmission
b) It verifies the integrity and authenticity of a message
c) It generates a public and private key pair
d) It encrypts data using symmetric encryption
Correct Answer: b) It verifies the integrity and authenticity of a message
Explanation: A digital signature is used to verify the integrity and authenticity of a message, ensuring that it has not been tampered with and was sent by the claimed sender.
Question 46
Which of the following best describes an initialization vector (IV) in encryption?
a) It is a secret key used to encrypt data
b) It is a random value used to ensure that identical plaintexts produce different ciphertexts
c) It is a value used to pad the plaintext to a fixed length
d) It is a value used for generating digital signatures
Correct Answer: b) It is a random value used to ensure that identical plaintexts produce different ciphertexts
Explanation: An initialization vector (IV) is a random value used to ensure that the same plaintext encrypted multiple times with the same key produces different ciphertexts.
Question 47
What is the primary difference between symmetric and asymmetric encryption?
a) Symmetric encryption uses different keys for encryption and decryption, while asymmetric encryption uses the same key for both
b) Symmetric encryption is faster, while asymmetric encryption provides better security
c) Asymmetric encryption is faster, while symmetric encryption provides better security
d) Asymmetric encryption uses smaller keys than symmetric encryption
Correct Answer: b) Symmetric encryption is faster, while asymmetric encryption provides better security
Explanation: Symmetric encryption is generally faster, but asymmetric encryption provides better security by using separate keys for encryption and decryption.
Question 48
Which of the following encryption algorithms is used for key exchange in secure communication?
a) AES
b) RSA
c) Diffie-Hellman
d) SHA-256
Correct Answer: c) Diffie-Hellman
Explanation: Diffie-Hellman is a key exchange algorithm used to establish a shared secret between parties over an insecure channel.
Question 49
Which type of cryptographic attack involves modifying the encryption process to leak information about the plaintext or key?
a) Chosen-plaintext attack
b) Timing attack
c) Man-in-the-middle attack
d) Replay attack
Correct Answer: b) Timing attack
Explanation: A timing attack involves analyzing the time taken to perform cryptographic operations to gather information about the encryption key or plaintext.
Question 50
What is the purpose of hashing in cryptography?
a) To ensure data confidentiality
b) To ensure data integrity
c) To encrypt data for secure transmission
d) To generate cryptographic keys
Correct Answer: b) To ensure data integrity
Explanation: Hashing ensures data integrity by producing a fixed-length hash value from input data, allowing verification that the data has not been altered.