CCNA Cyber Ops FAQ: Fundamentals of Cryptography and Public Key Infrastructure (PKI)
Q1. Which of the following are examples of common methods used by ciphers?
Q2. Which of the following are examples of symmetric block cipher algorithms?
A. Advanced Encryption Standard (AES)
B. Triple Digital Encryption Standard (3DES)
Q3. Which of the following are examples of hashes?
Q4. Which of the following are benefits of digital signatures?
Q5. Which of the following statements are true about public and private key pairs?
A. A key pair is a set of two keys that work in combination with each other as a team.
B. A key pair is a set of two keys that work in isolation.
C. If you use the public key to encrypt data using an asymmetric encryption algorithm, the corresponding private key is used to decrypt the data.
D. If you use the public key to encrypt data using an asymmetric encryption algorithm, the peer decrypts the data with that public key.
Q6. Which of the following entities can be found inside of a digital certificate?
B. DNS server IP address
C. Default gateway
D. Public key
Q7. Which of the following is true about root certificates?
A. A root certificate contains information about the user.
B. A root certificate contains information about the network security device.
C. A root certificate contains the public key of the CA.
D. Root certificates never expire.
Q8. Which of the following are public key standards?
B. PKCS #10
C. PKCS #12
Q9. Which of the following files have the same contents based on their SHA checksum?
bash-3.2$ shasum *
A. cat.txt, dog.txt, and table.txt
B. table.txt and chair.txt
C. chicken.txt and cat.txt
D. chicken.txt and dog.txt
Q10. Which of the following statements is true about collision attacks?
A. A collision attack is an attack against databases that causes a collision of data and results in data corruption.
B. A collision attack is a type of denial-of-service (DoS) attack.
C. Collision attacks are a form of web application attack that leverage the collision of data types and data models.
D. A collision attack is an attempt to find two input strings of a hash function that produce the same hash result
Q11. Among MD5, SHA-1, and SHA-2, which is the most secure?
D. They are all equally secure.
Q12. Certificate authorities can be deployed in a hierarchical way. Root CAs can delegate their authority to what type of CAs to create and assign identity certificates to clients?
A. Sub-root CAs
B. Subordinate CAs
C. Client CAs
D. Enrollment CAs
Q13. What is a certificate revocation list (CRL)?
A. A list of root certificates of CA servers that can revoke certificates.
B. A list of certificates, based on their serial numbers, that had initially been issued by a CA but have not been revoked and are trusted.
C. A list of certificates, based on their serial numbers, that had initially been issued by a CA but have since been revoked and as a result should not be trusted.
D. A list of serial numbers of CA servers that can participate in a certificate revocation process.
Q14. Which of the following is a format for storing both public and private keys using a symmetric password-based key to “unlock” the data whenever the key needs to be used or accessed?
A. PKCS #12
B. PKCS #10
C. PKCS #7
D. PKCS #2
Q15. Which of the following is a format of a certificate request sent to a CA that wants to receive its identity certificate? This type of request would include the public key for the entity desiring a certificate.
A. PKCS #1
B. PKCS #7
C. PKCS #10
D. PKCS #12
Q16. Which of the following are examples of symmetric encryption algorithms?
Q17. Which of the following are examples of asymmetric encryption algorithms?
Q18. Which of the following are examples of hashing algorithms?