185. It is particularly important to protect audit trail data against modification during communication between parties. Which of the following security control techniques would protect against such modifications?
a.
Strong access controls, such as passwordsb.
Digital signaturesc.
Logging before and after image records of modificationsd.
Review of audit trail dataPasswords are not strong access controls due to their weaknesses, such as sharing or writing them down. Logging before and after image records of modification is incorrect because it is a passive activity and does not protect against modification. Audit trail data can be used to review what occurred after an event, for periodic reviews, and for real-time analysis.
186. Cryptography is a branch of mathematics based on the transformation of data. Which of the following is
a.
Cryptography ensures data confidentiality.b.
Cryptography ensures data integrity.c.
Cryptography ensures data availability.d.
Cryptography ensures electronic signatures.187. In cryptography, the Rivest, Shamir, and Adelman (RSA) scheme has which of the following pairs of characteristics?
1.
Secret key encryption algorithm system2.
Asymmetric cipher system3.
Public key encryption algorithm system4.
Symmetric cipher systema.
1 and 4b.
2 and 3c.
1 and 2d.
3 and 4188. What is the
a.
Ciphertext-only attackb.
Birthday attackc.
Chosen plain text attackd.
Adaptive chosen plain text attackA birthday attack is an attack against message digest 5 (MD5), a hash function. The attack is based on probabilities where it finds two messages that hash to the same value (collision) and then exploits it to attack. The attacker is looking for “birthday” pairs of two messages with the same hash values. This attack is not feasible given today’s computer technology.
In a chosen plain text attack, the attacker knows the plain text and the corresponding ciphertext and algorithm but does not know the key. This type of attack is harder but still possible. The adaptive chosen plain text attack is a variation of the chosen plain text attack where the selection of the plain text is changed based on the previous attack results.