Question
answer the following, me and my classmates are doing a survey to see when it comes to correct answers what people tend to do when
answer the following, me and my classmates are doing a survey to see when it comes to correct answers what people tend to do when faced with alot of choices at the end. answer as correctly as possible after finishing of this count how many true and falses you had choosen and how many a,b,c,d choices was choosen.
Identify four qualities of good encryption algorithms.
Identify and briefly explain the four main residual risks to volume encryption keys.
Volume encryption provides no real protection against hostile users or _________
You must never encrypt two messages with the same key stream. To avoid this, OFB introduces an extra data item, the __________ or __________.
The strongest and most respected modern ciphers are __________.
In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powered off. They then extracted drive encryption keys from RAM and used them to decrypt an encrypted drive. This is called a __________.
In the 1970s, the __________ was the only organization in the U.S. government with cryptographic expertise.
The phrases below describe properties or functions of encryption technologies. Match the type of encryption with its property or function.
|
|
You can clean data from a hard drive by:
A. | physically damaging the hard drive so it can't be read | |
B. | running a disk wipe program | |
C. | reformatting the hard drive | |
D. | deleting personal files and emptying the trash |
Stream cipher modes include:
A. | counter | |
B. | cipher feedback (CFB) | |
C. | cipher block combining (CBC) | |
D. | output feedback (OFB) |
Volume encryption risks include:
A. | untrustworthy encryption | |
B. | theft leaves data unprotected | |
C. | leaking the plaintext | |
D. | data copied to removable storage is unprotected |
Encryption can help protect volumes in the following situations except:
A. | when a storage device is lost or stolen | |
B. | when discarding a hard drive or other device without wiping it | |
C. | to prevent physical damage to a hard drive | |
D. | when an eavesdropper looks at the volume without the operating system in place |
Access control protects data on a computer against:
A. | hostile users | |
B. | theft | |
C. | Trojans | |
D. | recycling |
File encryption protects data on a computer against the following except:
A. | hostile users | |
B. | Trojan crypto | |
C. | theft | |
D. | Trojans |
When encrypting data with a block cipher, each repetition is called:
A. | a key schedule | |
B. | a run | |
C. | a round | |
D. | a key expansion |
The following are best practices or proper recommendations for choosing an encryption algorithm except:
A. | check recent news and research results in the crypto community | |
B. | use evaluated cryptographic products if using a certified algorithm | |
C. | do not use private label algorithms that have not been published and reviewed by the cryptographic community | |
D. | use DES if at all possible |
A self-encrypting drive locks data on the hard disk by:
A. | erasing the encryption key when the drive is unplugged or reset | |
B. | none of the answers | |
C. | changing the encryption algorithm after encrypting data | |
D. | prompting for the encryption key whenever data is accessed |
The following are properties of persistent key storage except:
A. | it uses nonvolatile storage | |
B. | it can wrap the key using a passphrase | |
C. | it can store the key on a removable storage device | |
D. | it uses volatile storage |
There are four strategies for cleaning a hard drive of personal date. Which one will actually make the data un-recoverable?
A. | Reformat the hard drive. | |
B. | Reinstall the Operating system. | |
C. | Delete personal files and empty the trash. | |
D. | Run a disk wipe program. |
AES supports exactly which three key sizes?
A. | 32 bits, 64 bits, 128 bits | |
B. | 128 bits, 192 bits, and 256 bits. | |
C. | 64 bits, 128 bits, and 256 bits. | |
D. | 8 bits, 16 bits, 32 bits, |
The counter value must be unique for every 128-bit block on the device. To do this, the counter incorporates the sector number and the block's index number within the sector. What are they?
A. | All of the answers | |
B. | The counter's low-order digits select a single block within the sector. There are 32 blocks of 128 bits each in a standard sector containing 512 bytes. We assign the five lowest bits in the counter to select a block within the sector. | |
C. | The middle digits in the counter select the sector on the hard drive | |
D. | The remaining high-order digits in the counter will contain a nonce that remains constant for all sectors on the hard drive. |
We reduce the risk of untrustworthy encryption by using certified products. In the United States, the recognized certification is FIPS
A. | 140-4 | |
B. | 140-2 | |
C. | 142-1 | |
D. | 160-8 |
After the volume encryption product implements its protections. What are some the risks remaining?
A. | All of the answers | |
B. | Intercepted keys | |
C. | Recycled CEK attack | |
D. | Intercepted passphrase |
What are three general risks we address with volume encryption?
A. | Losing the storage device | |
B. | An eavesdropper that looks at the volume without the operating system in place | |
C. | Discarding a hard drive or other device without wiping it | |
D. | All the Answers |
The underlying code of the Rijndael algorithm was leaked to the public in 1994, allowing for successful attacks against data encrypted with Rijndael.
True
False
Changing a single bit of a block cipher's input affects the entire output block.
True
False
A tweakable cipher includes a third input, a nonce-like value that modifies the encryption without the cost of changing the encryption key.
True
False
Counter mode and cipher block chaining (CBC) produce tweakable cipher modes.
True
False
Drive encryption makes it very easy to recycle the drivE) The owner directs the controller to purge itself of every copy of the current encryption key and of the associated nonces and IVs. Once finished, there is no practical way to decrypt any data on the hard drive.
True
False
To disable or bypass the encryption, attackers would need to attack the driver controller circuitry. Integrity risks may arise if the hardware relies on firmware and the firmware may be updated.
True
False
Key wrapping provides a simple, general-purpose approach for storing and protecting persistent key storage.
True
False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started