185. It is particularly important to protect audit trail data against modification during communication between parties. Which of the following security control techniques would protect against such modifications?
a. Strong access controls, such as passwords
b. Digital signatures
c. Logging before and after image records of modifications
d. Review of audit trail data
Passwords are not strong access controls due to their weaknesses, such as sharing or writing them down. Logging before and after image records of modification is incorrect because it is a passive activity and does not protect against modification. Audit trail data can be used to review what occurred after an event, for periodic reviews, and for real-time analysis.
186. Cryptography is a branch of mathematics based on the transformation of data. Which of the following is
a. Cryptography ensures data confidentiality.
b. Cryptography ensures data integrity.
c. Cryptography ensures data availability.
d. Cryptography ensures electronic signatures.
187. In cryptography, the Rivest, Shamir, and Adelman (RSA) scheme has which of the following pairs of characteristics?
1. Secret key encryption algorithm system
2. Asymmetric cipher system
3. Public key encryption algorithm system
4. Symmetric cipher system
a. 1 and 4
b. 2 and 3
c. 1 and 2
d. 3 and 4
188. What is the
a. Ciphertext-only attack
b. Birthday attack
c. Chosen plain text attack
d. Adaptive chosen plain text attack
A birthday attack is an attack against message digest 5 (MD5), a hash function. The attack is based on probabilities where it finds two messages that hash to the same value (collision) and then exploits it to attack. The attacker is looking for “birthday” pairs of two messages with the same hash values. This attack is not feasible given today’s computer technology.
In a chosen plain text attack, the attacker knows the plain text and the corresponding ciphertext and algorithm but does not know the key. This type of attack is harder but still possible. The adaptive chosen plain text attack is a variation of the chosen plain text attack where the selection of the plain text is changed based on the previous attack results.