LOCKSMITH SECTION 8 EXAM
A
Questions and Their Correct
VI
Solutions 2024!
TU
Which of the following is an advantage of ECDSA over RSA digital signatures?
IS
a. ECDSA is more efficient for generating digital signatures
b. ECDSA is more efficient for verifying digital signatures
c. ECDSA is simpler than RSA
M
d. ECDSA can not be broken if non-random values are used - ANSWER a
O
Where does TLS operate with respect to the network protocol stack?
a. TLS operates between the physical hardware layer and data link protocols like
A
Ethernet
b. TLS operates between the data link protocols like Ethernet and IP
N
c. TLS operates between IP and transport layer protocols like TCP
d. TLS operates between transport layer protocols like TCP and application protocols
like HTTP - ANSWER d
JP
The Heartbleed attack was an example of which of the following?
a. a compromised certificate authority
b. a compromised server
c. a compromised client
d. bugs in implementation - ANSWER d
Which of the following best describes the ECDLP problem?
,a. solve for y in g^y = x mod p for given integers x, g, and p
b. solve for k in Q = kP for given points Q and P
c. compute P + Q for given points Q and P
d. compute kP for given interger k and point P - ANSWER b
Which of the following is not true about elliptic curves?
a. an equation of the form y^2 = x^3 + ax + b defines an elliptic curve
A
b. for every real value of x there is a corresponding y, such that (x, y) is a point on a
given elliptic curve
VI
c. there can be multiple values of y for a given x such that (x, y) is a point on a given
elliptic curve
d. an elliptic curve of the form y^2 = x^3 + ax + b is symmetric with respect to the x-axis
TU
- ANSWER b
Which of the following TLS 1.2 features was dropped by TLS 1.3?
IS
a. AES-GCM
b. AES-CCM
c. AES-CBC
d. ChaCha20-Poly1305 - ANSWER c
M
Assume that Alice chooses private value dA and computes public value PA and Bob
O
chooses private value dB and computes public value PB. How does Alice compute the
shared secret using ECDH?
A
a. S = PBdA
b. S = PAdB
N
c. dAPB
d. dBPA - ANSWER c
JP
Which of the following is not included in a ServerHello message in the TLS handshake
protocol?
a. the server's short-term public key
b. the session keys
c. a digital signature
d. a message authentication code - ANSWER b
, If points P and Q on an elliptic curve of the form y^2 = x^3 + ax + b have the same
x-coordinate, how do you compute P + Q?
a. compute the slope m = (yQ - yP) / (xQ - xP)
b. compute the slope m = (3xP^2 + a) / (2yP)
c. P + Q = (xP + xQ, yP + yQ)
d. P + Q = O - ANSWER d
What is a certificate?
A
a. a public key along with additional information authenticated using a digital signature
VI
b. a private key along with additional information authenticated using a digital signature
c. a public key along with additional information authenticated using a message
authentication code
TU
d. a private key along with additional information authenticated using a message
authentication code - ANSWER a
Which of the following best describes how RSA is used to generate digital signatures?
IS
a. the sender signs the message using her public key. the receiver uses the sender's
private key to verify it
b. the sender signs the message using her private key. the receiver uses the sender's
M
public key to verify it
c. the sender signs the message using the receiver's public key. the receiver uses his
O
own private key to verify it
d. the sender signs the message using the receiver's private key. the receiver uses his
own public key to verify it - ANSWER b
A
What is the different between the computational Diffie-Hellman (CDH) problem and the
N
decisional Diffie-Hellman (DDH) problem?
a. CDH is easier than the discrete logarithm problem (DLP). DDH is harder than DLP
JP
b. CDH involves computing the shared secret from the public values. DDH involves
distinguishing the shared secret from another generated value.
c. CDH provides a stronger hardness assumption than DDH
d. CDH involves computing one of the private values from one of the public values.
DDH involves computing one of the public values from one of the private values -
ANSWER b