Question 1: A security administrator is selecting an encryption standard for full disk encryption that supports 128-bit, 192-bit, and 256-bit key lengths and that uses the same key for both encryption and decryption. Which algorithm should they select?
Pro Tip! Notice this question doesn't actually tell you to choose a secure answer (AES). You can ALWAYS assume that the questions want you to choose a secure answer instead of an insecure one.
Question 2: An organization is implementing email encryption for secure communications between business partners. They need to send encrypted messages to recipients without having previously shared a secret key, ensuring that only the specific recipient can open the message. Which cryptographic approach enables this?
Question 3: A system architect is choosing between RSA and ECC for securing IoT devices with limited processing power and battery life. Which answer BEST explains the most suitable choice and why?
Question 4: A company is concerned that increasing encryption key lengths will impact system performance. They are debating a choice between 128-bit and 256-bit key length. What is the BEST way to explain this discussion to senior management?
Question 5: A developer needs to securely exchange a symmetric encryption key over an insecure network channel without having previously shared any secret keys. There is a risk of an attacker attempting to intercept the key on the insecure channel. The developer chooses a protocol that uses ephemeral or rotating keys to secure the key exchange. Which of the following is the best solution?
Question 6: An organization wants to ensure that, if their long-term private key is compromised in the future, previously intercepted encrypted sessions cannot be fully decrypted. Which feature provides this protection?
Question 7: A security team is implementing TLS for online communications. They want to ensure that the initial key exchange uses asymmetric encryption to establish a secure channel and authenticates each party, then changes to symmetric encryption for the secure data transfer. What is the primary reason for this change?
Question 8: A company is evaluating encryption solutions and notes that one solution requires a key pair where the public key is shared openly while the private key remains secret. If the public key is used to encrypt data, what is required to decrypt it?
Question 9: The Chief Executive Officer (CEO) of a company, David, needs to send a short email to the Head of Governance, Risk, and Compliance (GRC), Yasmina. The objective is to ensure that David can easily encrypt the email with a key he already has, but that only Yasmina can read the message. Which key would David use to send the message?
Question 10: A leading cybersecurity professor, Dr. Aly, wishes to send a short email to the rest of his team. The objective is to ensure that anyone can open the message, so there is no confidentiality, but that the students are certain Dr. Aly is the person who sent the message. Which key would Dr. Aly use to send the message?
Question 11: A forensic analyst needs to verify that a downloaded file has not been altered during transfer. They compare a calculated fixed-length digest of the file against the source's published digest value, and then they check whether both values are exactly the same. What cryptographic property is being assessed?
Question 12: A penetration tester discovers that a web application stores password hashes using MD5. What would they note in their report to senior management?
Question 13: A system administrator is implementing password storage in a website. They want to prevent the use of pre-computed rainbow table attacks by ensuring that identical passwords produce different hash values in the database. What technique should they implement?
Question 14: Ahmed is tasked with selecting the best approach for salting passwords in his organization. Which of the following is the BEST approach to salting?
Question 15: An organization is using an outdated, insecure hashing algorithm on their services. They attempt to protect against brute-force attacks against stored hashes by requiring thousands of iterations of hashing, to delay attackers for as long as possible. What is this technique called?
Question 16: A security auditor needs to verify the integrity of a system configuration file to ensure it has not been tampered with. They generate a fixed-length string that uniquely represents the file's contents. Which algorithm is most appropriate for this integrity check?
Question 17: A laptop manufacturer wants to include a hardware chip that can securely store encryption keys, perform attestation, and ensure the operating system has not been tampered with during boot. What component provides this functionality?
Question 18: An enterprise needs a high-grade, tamper-resistant hardware device to manage and store cryptographic keys for thousands of transactions per second in a financial processing center. This device must meet FIPS 140-2 Level 3 or 4 standards. What solution is required?
Question 19: A distributed ledger technology is being implemented to ensure immutable records of transactions. Each block contains a hash of the previous block, ensuring integrity. What technology is being described?
Question 20: A malware developer wants to hide the existence of stolen data within an image file by altering the least significant bits of pixel values so that the image looks unchanged to the human eye but contains hidden information. What technique is being used?
Question 21: A software company wants to make its source code difficult to reverse engineer without actually encrypting it, by renaming variables and adding unnecessary complexity to the logic flow. What is this technique called?
Question 22: An organization needs to bind public keys to verified identities, using digitally signed electronic documents that contain the subject's public key, validity period, and issuer information. What component of PKI provides this?
Question 23: A user generates a file containing their public key and identifying information, then encrypts it with their private key to prove possession, before sending it to a trusted Certificate Authority. What is this action called?
Question 24: A browser validates a website's certificate by checking a pre-installed certificate at the top of a trust hierarchy. What is this ultimate trust anchor called?
Question 25: A security administrator needs to check if a certificate has been revoked before the expiration date. Which mechanism provides a real-time query to determine the current status of a certificate?
Question 26: A Certificate Authority maintains a periodically updated list of certificates that should no longer be trusted before their scheduled expiration. However, a company no longer wishes to check the list periodically. Instead, they wish to have their browsers automatically retrieve the most recent information at regular intervals and attach it to handshake requests. What is the best solution?
Question 27: A system needs to ensure non-repudiation so that a business partner cannot later deny having signed a contract. The sender encrypts a hash of the document with their private key. What is the best description of this mechanism?
Question 28: An organization must retain access to encrypted data even if an employee leaves and forgets their password, by storing a copy of the decryption key with a trusted third party. What is the best solution for this?
Question 29: A web server presents a certificate containing multiple DNS names (e.g., www.example.com and example.com) in a specific field that modern browsers check instead of the Common Name. What is this field called?
Question 30: A company needs to deploy a secure wireless network protocol that protects against offline dictionary attacks and provides forward secrecy to ensure that previously captured traffic cannot be decrypted even if the network password is compromised in the future. Which is the BEST protocol to implement?