91. c.
Improper error handling during a transmission between a sender and a receiver can result in side channel attacks, which can result in integrity failures. A security policy should define the response to such a failure. Remedies for integrity failures can include retransmission limited to a predetermined number of times and storing the error data in an audit log for later identification of the source of the error.The other three choices do not allow side channel attacks because they do not deal with transmission errors. Confidentiality deals with privacy and nondisclosure of information, and more. Availability deals with making data and systems within the reach of users. Labels are used to identify attributes, parameters, or the intended use of a key.
92. Public key authentication systems:
a.
Are faster than private key systemsb.
Do not use digital signaturesc.
Are slower than private key systemsd.
Do not use alpha characters in the key92. c.
Public key methods are much slower than private methods and cause overhead, which are their main disadvantages. The public key contains alphanumeric characters. The public key systems use digital signatures for authentication.93. Which of the following is
not a common route to data interception?a.
Direct observationb.
Data encryptionc.
Interception of data transmissiond.
Electromagnetic interception93. b.
There are three routes of data interception: direct observation, interception of data transmission, and electromagnetic interception. Data encryption can be a solution to data interception. 94. The combination of XEX tweakable block cipher with ciphertext stealing and advanced encryption standard (XTS-AES) algorithm was designed to provide which of the following?
1.
Encryption of data on storage devices 2 Encryption of data in transit
3.
Confidentiality for the protected data4.
Authentication of dataa.
1 and 2b.
1 and 3c.
2 and 4d.
3 and 494. c.
The XTS-AES mode was designed for the cryptographic protection of data on storage devices that use fixed length data units, and it was not designed for encryption of data in transit. This mode also provides confidentiality for the protected data but not authentication of data or access control.95. Which of the following is
not used for public key infrastructure-based (PKI-based) authentication of system users?a.
Validates certificates by constructing a certification path to an accepted trust anchorb.
Establishes user control of the corresponding private keyc.
Maps the authenticated identity to the user accountd.
Uses a radius server with extensible authentication protocol and transport layer security authentication95. d.
A radius server with extensible authentication protocol (EAP) and transport layer security (TLS) authentication is used to identify and authenticate devices on LANs and/or WANs. It is not used for authenticating system users. The other three choices are used for PKI-based authentication of system users. 96. Message authentication code (MAC) provides which of the following security services?
a.
Confidentiality and integrityb.
Authentication and integrityc.
Accountability and availabilityd.
Assurance and reliability96. b.
The message authentication code (MAC) provides data authentication and integrity. A MAC is a cryptographic checksum on the data that is used to provide assurance that the data has not changed and that the MAC was computed by the expected entity. It cannot provide other security services. 97. Which of the following are countermeasures against traffic analysis attacks?
1.
Traffic flow signal control2.
Traffic encryption key3.
Traffic flow security4.
Traffic paddinga.
1 and 2b.
1 and 3c.
2 and 4d.
3 and 497. d.
Traffic flow security is a technique to counter traffic analysis attacks, which is the protection resulting from encrypting the source and destination addresses of valid messages transmitted over a communications circuit. Security is assured due to use of link encryption and because no part of the data is known to an attacker. Traffic padding, which generates mock communications or data units to disguise the amount of real data units being sent, also protects traffic analysis attacks.