Professional Documents
Culture Documents
Information Security Answers
Information Security Answers
Information Security Answers
1. It takes time to recover from information security attacks. What type of attacks take the most time to
resolve?
(a) Attacks performed by insiders
(b) Denial of service attacks
(c) Phishing attacks
(d) Virus attacks
5. The enemy intercepts an encrypted message. Eventually the enemy is able to decrypt the message, but
it required exhaustive searching. The encryption method we used
(a) violates Kerckhoffs’ principle
(b) can still be considered ‘secure’ (as in: ‘Perfect Secrecy’)
(c) cannot be considered ‘secure’
(d) might have been the Viginere cipher
1
6. Using a one-time pad plain text P is encrypted to encrypted text E using key K. Only letters are used
and the indices of the letters in the key determine the shifts of the letters in the plain text.
7. Transposition ciphers use permutation matrices. Using the notation P’ to indicate the transposed
matrix P; P1, P2 are permutation matrices, T is the matrix containing the plain text, and E the matrix
containing the encrypted text, then A
8. With Feistel ciphers blocks are split in left and right halves. If only one encryption round is used, then
(a) the left half is not modified and becomes the left half in the next round, where-after the key
schedule is applied to the left half in the next round
(b) the left half is not modified and becomes the right half in the next round
(c) the right half is not modified and becomes the right half in the next round, where-after the key
schedule is applied to the right half in the next round
(d) the right half is not modified and becomes the left half in the next round
9. DES is
(a) implemented as a stream cipher
(b) implemented as a Feistel cipher using L and R blocks of 64 bits (8 bytes) each
(c) susceptible to brute force attacks
(d) also known as the ‘Lucifer’ encryption method
10. (Using Ci to indicate the i-th encrypted block, Pi to indicate the i − th plain text block)
Information leakage can be a problem with the CBC block cipher mode
(a) if Pi is equal to Pi+1 then the corresponding encrypted blocks are also identical
(b) if Ci is equal to Cj then Pi is equal to Pj
(c) if Ci is equal to Cj then Pi ⊕ Pj is known
(d) if Ci is equal to Cj then Pi ⊕ Pj equals Ci-1 ⊕ Cj-1
2
11. A linear Diophantine equation xe + yf = g uses e = 4, y = 8. Once the equation is solved for x and
y then an alternative solution for x and y
(a) does not exist, as solutions of linear Diophantine equations are unique
(b) can be 4 + x and -4 + y
(c) can be 8 * x and -8 * y
(d) can be 4 * x and -4 * y
3
(c) the message cannot be retrieved from the hash value
(d) the hash values of different messages are different
17. To verify the integrity of a message M its hash value h(M) can be computed
(a) The recipient, receiving message M in an e-mail attachment and h(M) in a second attachment is
able to verify that the received M equals the sender’s M
(b) The procedure described in the 1st alternative can only be used if HMAC, using h(K | M), is used,
where K is a key shared by the sender and recipient (the operator | concatenates the right-hand
message to the left-hand message)
(c) The procedure described in the 1st alternative can only be used if HMAC, using h(M |
K), is used, where K is a key shared by the sender and recipient
(d) None of the above alternative can be used to verify the integrity of a message M
18. Alice and Bob agree on a key K. They use HMAC to compute a hash value of a message they send to each
other, using the h(K, M) procedure. Eve has no access to K, but can intercept M and h(K, M)
(a) Eve can modify M and, recompute the hash value, and forward both to the recipient
(b) Eve can append information to M, recompute the hash value, and forward both to the
recipient
(c) Both 1 and 2
(d) Neither 1, nor 2
19. When Alice and Bob exchange messages, they use HMAC, a shared key K, and messages M, as well as a
hashing function h(). Trudy wants to interfere. B/D
(a) Using h(K, M) is OK, assuming h(M1) != h(M2)
(b) Using h(M, K) is OK, assuming h(M1) != h(M2)
(c) Using h(K, M) is OK, assuming Trudy cannot access K
(d) Using h(M, K) is OK, assuming Trudy cannot access K
20. A Cyclic Redundancy Check (CRC) computation uses divisor bits 11111 and bitstream bits (1st bit
received) 1110001100 (last bit received).
What is the CRC value (using bits)? UNKNOWN: answer is 1000, but not on list of an-
swers. If we need to flip the bits first, then we get 1111 (D). If the checksum is appended
to the message and we remove the last 4 digits (n-1), we get 0011 (B).
(a) 1
(b) 11
(c) 111
(d) 1111
21. The main reason for requiring that every now and then a new password must be selected is:
(a) to prevent brute force attacks against your password
4
(b) to reduce the risk of abuse caused by you sharing your credentials with others
(c) to reduce the risk of abuse caused by the tendency of people to select weak passwords
(d) that the computer you’re connecting to does not support cryptographic keys
22. For authentication an organization requires you to use a password of letters and digits. There are 26
letters in the alphabet, and there are 10 digit characters. Using these requirements, how many different
passwords of 8 characters can be constructed? D
(a) 262
(b) 2512
(c) 862
(d) 628
23. In a protocol where Alice and Bob want to realize mutual authentication (h() indicates a hashing
function, Kab is an encryption key shared between Alice and Bob, E(M; K) is an encryption function
to encrypt M using key K),
24. When Pa is Alice’s public key, Pb is Bob’s public key, Sa is Alice’s secret key, Sb is Bob’s secret key,
then, when Alice must authenticate herself to Bob she must return the nonce that she received from
Bob back to Bob.
25. Alice and Bob agree on using K, a shared encryption key. Also, they may use ephemeral Diffie-Hellman.
For each new session they agree to use a separate encryption key Y. When Alice constructs Y, which
protocol should NOT be used to inform Bob about Y? (EM,x indicates M, encrypted with key x) B/C
(a) Alice sends E{pow(g, a) mod p}, Bob replies with E{pow(g, b) mod p}
(b) Alice sends E{M2,K}, Bob replies with E{M3,K}
(c) Alice sends E{Y,K}, Bob replies with E{M,Y}
(d) None of the above protocols should be used
26. When creating your PGP key, two pairs of keys are created
5
(a) The public key used for encrypting should be signed by people from whom you receive encrypted
messages
(b) The public key used for signing should be signed by people from whom you receive
signed messages
(c) The secret key used for encrypting should be signed by people to whom you send encrypted
messages
(d) The secret key used for signing should be signed by people to whom you send encrypted messages
27. Different from using clear-text information exchange, GPG can be used to
(a) Guarantee the confidentiality and integrity of the exchanged information
(b) Verify the authenticity and author of the exchanged information
(c) Both 1 and 2
(d) Neither 1, nor 2
29. In the way PGP is normally used, and if it is correctly used, then you cannot verify the authenticity of
a received message
(a) if it is signed by the sender
(b) if you signed the sender’s public key
(c) if the sender signed your public key
(d) if the sender’s public key was signed by at least 3 people whose public keys were signed by you.