1100 Flashcards

1
Q

A symmetric cipher that was designed to replace DES.

A

Triple Data Encryption Standard (3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A chip on the motherboard of the computer that provides cryptographic services.

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A later derivation of the Blowfish algorithm that is considered to be strong.

A

Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptography that can be applied to entire disks.

A

Whole Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What is data called that is to be encrypted by inputting into an encryption algorithm? 
A. Plaintext
B. Cleartext
C. Opentext
D. Ciphertext
A

A. Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is not a basic security protection over information that cryptography can provide? 
A. confidentiality
B. Stop loss
C. Integrity
D. Authenticity
A

B. Stop loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The areas of a file in which steganography can hide include all of the following except __________.
A. in data that is used to describe the content or structure of the actual data
B. in the directory structure of the file system
C. in the file header fields that describe the file
D. in areas that contain the content data itself

A

B. in the directory structure of the file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proving that a user sent an e-mail message is known as ______. A. repudiation B. integrity C. nonrepudiation D. availability

A

C. nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric cryptographic algorithms are also called _________. A. private key cryptographyB. cipherkey cryptographyC. public/private key cryptographyD. public key cryptography

A

A. private key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A(n) __________ is not decrypted - but is only used for comparison purposes. A. stream B. hash C. algorithm D. key

A

B. hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Each of the following is a characteristic of a secure hash algorithm except ____________. A. collisions should be rareB. the results of a hash function should not be reversedC. the hash should always be the same fixed sizeD. a message cannot be produced from a predefined has A. collisions should be rare B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined has

A

A. collisions should be rare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n) __________ is not decrypted - but is only used for comparison purposes. A. stream B. hash C. algorithm D. key

A

B. encrypting and decrypting e-mail attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___________ encrypts a hash with a shared secret key. A. Key_hashB. WEPC. MDRIPED. Hashed Message Authentication Code (HMAC) A. Key_hash B. WEP C. MDRIPE D. Hashed Message Authentication Code (HMAC)

A

D. Hashed Message Authentication Code (HMAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a protection provided by hashing? A. AuthenticityB. ConfidentialityC. IntegrityD. Availability A. Authenticity B. Confidentiality C. Integrity D. Availability

A

C. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ is a hash that uses two different and independent parallel chains of computation - the results of which are then combined at the end of the process. A. DESB. AESC. RC4D. RIPEMD A. DES B. AES C. RC4 D. RIPEMD

A

D. RIPEMD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the strongest symmetric cryptographic algorithm? A. Advanced Encryption StandardB. Data Encryption StandardC. Triple Data Encryption StandardD. Rivest Cipher (RC) 1 A. Advanced Encryption Standard B. Data Encryption Standard C. Triple Data Encryption Standard D. Rivest Cipher (RC) 1

A

A. Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If Bob want to send a secure message to Alice using an asymmetric cryptographic algorithm - the key he uses to encrypt the message is __________. A. Alice’s private keyB. Alice’s public keyC. Bob’s public keyD. Bob’s private key A. Alice’s private key B. Alice’s public key C. Bob’s public key D. Bob’s private key

A

B. Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A digital signature can provide each of the following benefits except __________. A. prove the integrity of the messageB. verify the receiverC. verify the senderD. enforce nonrepudiation A. prove the integrity of the message B. verify the receiver C. verify the sender D. enforce nonrepudiation

A

B. verify the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following asymmetric cryptographic algorithms is the most secure? A. MEC-2B. RSAC. MD-17D. SHA-2 A. MEC-2 B. RSA C. MD-17 D. SHA-2

A

B. RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following asymmetric encryption algorithms uses prime numbers? A. EFSB. Quantum computingC. ECCD. RSA A. EFS B. Quantum computing C. ECC D. RSA

A

D. RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__________ uses lattice-based cryptography and may be more resistant to quantum computing attacks. A. NTRUEncryptB. ECCC. RC4D. SHA-512 A. NTRUEncrypt B. ECC C. RC4 D. SHA-512

A

A. NTRUEncrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Trusted Platform Module (TPM) __________. A. allows the user to boot a corrupted disk and repair it B. is only available on Windows computers running BitLocker C. includes a pseudorandom number generator (PRNG) D. provides cryptographic services in hardware instead of software

A

D. provides cryptographic services in hardware instead of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following has an onboard key generator and key storage facility - accelerated symmetric and asymmetric encryption - and can back up sensitive material in encrypted form? A. Trusted Platform Module (TPM) B. Self-encrypting hard disk drives (HDDs) C. Encrypted hardware-based USB devices D. Hardware Security Module (HSM)

A

D. Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Microsoft Windows LAN Manager hash ___________. A. is weaker than NTLMv2 B. is part of BitLocker C. is required to be present when using TPM D. is identical to MD-4

A

A. is weaker than NTLMv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A trust model with one CA that acts as a facilitator to interconnect all other CA’s.

A

Bridge Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A trusted third-party agency that is responsible for issuing the digital certificates.

A

Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A publicly accessible centralized directory that contains digital certificates that can be used to view the status of a digital certificate.

A

Certificate Repository (CR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A repository that lists revoked digital certificates.

A

Certificate Revocation List (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A technology used to associate a user’s identity to a public key - in which the user’s public key is “digitally signed” by a trusted third-party.

A

Digital Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A type of trust model in which a relationship exists between two individuals because one person knows the other person.

A

Direct Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A trust model that has multiple CA’s that sign digital certificates.

A

Distributed Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A trust model that has a single hierarchy with one master CA.

A

Hierarchical Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A secure version of HTTP sent over SSL/TLS.

A

Hypertext Transport Protocol Over Secure Sockets Layer (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A set of protocols developed to support the secure exchange of packets.

A

IP Security (IPsec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A process in which keys are managed by a third party - such as a trusted CA called the root.

A

Key Escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A highly trusted person responsible for recovering lost or damaged digital certificates.

A

Key Recovery Agent (KRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A technique to recover a private key by distributing parts to different individuals.

A

M-of-N Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A framework for all of the entities involved in digital certificates for digital certificate management.

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.

A

Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A UNIX-based command interface and protocol for securely accessing a remote computer.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.

A

Secure Sockets Layer (SSL)

42
Q

A trust model in which two individuals trust each other because each individually trusts a third-party.

A

Third-Party Trust

43
Q

A protocol that is an extension of SSL and guarantees privacy and data integrity between applications.

A

Transport Layer Security (TLS)

44
Q

The type of trusting relationship that can exists between individuals or entities.

A

Trust Model

45
Q

The most widely accepted format for digital certificates as defined by the International Telecommunication Union (ITU).

A

X.509

46
Q

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ___________. A. digital signature B. encrypted signature C. hash D. digital certificate

A

D. digital certificate

47
Q

A digital certificate associates __________. A. a private key with a digital signature B. the user’s identity with their public key C. a user’s private key with the public key D. a user’s public key with their private key

A

B. the user’s identity with their public key

48
Q

Digital certificates can be used for each of the following except __________. A. to verify the authenticity of the Registration Authorizer B. to verify the identity of clients and servers on the Web C. to encrypt messages for secure e-mail communications D. to encrypt channels to provide secure communication between clients and servers

A

A. to verify the authenticity of the Registration Authorizer

49
Q

An entity that issues digital certificates is a ______________. A. Certificate Signatory (CS) B. Signature Authority (SA) C. Digital Signer (DS) D. Certificate Authority (CA)

A

D. Certificate Authority (CA)

50
Q

A centralized directory of digital certificates is called a(n) __________. A. Digital Signature Approval List (DSAP) B. Digital Signature Permitted Authorization (DSPA) C. Authorized Digital Signature (ADS) D. Certificate Repository (CR)

A

D. Certificate Repository (CR)

51
Q

Each of the following is a field of an X.509 certificate except __________. A. validity period B. CA expiration code C. serial number D. Signature

A

B. CA expiration code

52
Q

In order to ensure a secure cryptographic connection between a Web browser and a Web server - a(n) _________ would be used. A. e-mail Web certificate B. server digital certificate C. personal digital certificate D. Web digital certificate

A

B. server digital certificate

53
Q

A digital certificate that turns the address bar green is a(n) __________. A. X.509 certificate B. Advanced Web Server Certificate (AWSC) C. Extended Validation SSL Certificate D. Personal Web-Client Certificate

A

C. Extended Validation SSL Certificate

54
Q

The __________-party trust model supports CA. A. first B. second C. third D. fourth

A

C. third

55
Q

Public-key Cryptography Standards (PKCS) __________. A. are used to create public keys only B. define how hashing algorithms are created C. have been replaced by PKI D. are widely accepted in the industry

A

D. are widely accepted in the industry

56
Q

Each of the following is true regarding a hierarchical trust model except __________. A. it assigns a signal hierarchy with one master CA B. it is designed for use on a large scale C. the master CA is called the root D. the root signs all digital certificate authorities with a single key

A

B. it is designed for use on a large scale.

57
Q

Dual-sided digital certificates __________. A. are used in military and financial settings when it is necessary for the client to authenticate back to the server B. are the same as dual-key digital certificates C. are required under PKCS #1 D. require a special browser

A

A. are used in military and financial settings when it is necessary for the client to authenticate back to the server

58
Q

Which of the following is not where keys can be stored? A. in hashes B. on the user’s local system C. embedded in digital certificates D. in tokens

A

A. in hashes

59
Q

Public Key Infrastructure (PKI) __________. A. creates private key cryptography B. requires the use of an RA instead of a CA C. generates public/private keys automatically D. is the management of digital certificate

A

D. is the management of digital certificate

60
Q

A(n) __________ is a published set of rules that govern the operation of a PKI. A. certificate policy (CP) B. certificate practice statement (CPS) C. signature resource guide (SRG) D. enforcement certificate (EF)

A

A. certificate policy (CP)

61
Q

Which of the following is not part of the certificate life cycle? A. Authorization B. Creation C. Expiration D. Revocation

A

A. Authorization

62
Q

__________ refers to a situation in which keys are managed by a third party - such as a trusted CA. A. Remote key administration B. Trusted key authority C. Key authorization D. Key escrow

A

D. Key escrow

63
Q

__________ is a protocol for securely accessing a remote computer. A. Secure Shell (SSH) B. Secure Sockets Layer (SSL) C. Secure Hypertext Transport Protocol (SHTTP) D. Transport Layer Security (TLS)

A

A. Secure Shell (SSH)

64
Q

What is the cryptographic transport protocol that is used most often to secure Web transactions? A. SHTTP B. PPPTPoE C. HTTPS D. MD-17

A

C. HTTPS

65
Q

Which transport encryption algorithm is integrated as part of IPv6? A. IPsec B. SSH C. SSL/TLS D. RSA

A

A. IPsec

66
Q

The ability that provides tracking of events.

A

Accounting

67
Q

An item that has value.

A

Asset

68
Q

The act of ensuring that an individual or element is genuine.

A

Authorization

69
Q

The steps that ensure that the individual is who they claim to be.

A

Authentication

70
Q

Security actions that ensure that data is accessible to authorized users.

A

Availability

71
Q

The first state law that covers any state agency - person - or company that does business in California.

A

California’s Database Security Breach Notification Act (2003)

72
Q

Security actions that ensure only authorized parties can view the information.

A

Confidentiality

73
Q

Targeted attacks against financial networks - unauthorized access to information - and the theft of personal information.

A

Cybercrime

74
Q

A network of attackers - identity thieves - spammers - and financial fraudsters.

A

Cybercriminals

75
Q

A premeditated - politically motivated attack against information - computer systems - computer programs - and data that results in violence.

A

Cyberterrorism

76
Q

Attackers whose motivation may be defined as ideology - or attaching for the sake of their principles or beliefs.

A

Cyberterrorists

77
Q

The act of taking advantage of a vulnerability.

A

Exploiting

78
Q

A law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

A

Gramm-Leach-Bliley Act (GLBA)

79
Q

A term used to refer to a person who used advanced computer skills to attack computers.

A

Hacker

80
Q

A law designed to guard protected health information and implement policies and procedures to safeguard it.

A

Health Insurance Portability and Accountability Act (HIPAA)

81
Q

Stealing another person’s personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.

A

Identity Theft

82
Q

The tasks of securing information that is in a digital format.

A

Information Security

83
Q

Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

A

Integrity

84
Q

The likelihood that a threat agent will exploit the vulnerability.

A

Risk

85
Q

A law designed to fight corporate corruption.

A

Sarbanes-Oxley Act (Sarbox)

86
Q

Individuals who want to break into computers to create damage - yet lack the knowledge of computers and networks needed to do so.

A

Script Kiddies

87
Q

A person who has been hired to break into a computer and steal information.

A

Spy

88
Q

A type of action that has the potential to cause harm.

A

Threat

89
Q

A person or element that has the power to carry out a threat.

A

Threat Agent

90
Q

A flaw or weakness that allows a threat agent to bypass security.

A

Vulnerability

91
Q

Each of the following is a reason it is difficult to defend against today’s attackers except __________. A. complexity of attack tools B. weak patch distribution C. greater sophistication of attacks D. delays in patching software products

A

A. complexity of attack tools

92
Q

In a general sense - “security” is __________. A. protection from only direct actions B. using reverse attack vectors (RAV) for protection C. only available on hardened computers and systems D. the necessary steps to protect a person or property from harm

A

D. the necessary steps to protect a person or property from harm

93
Q

__________ ensures that only authorized parties can view the information. A. confidentiality B. availability C. integrity D. authorization

A

A. confidentiality

94
Q

Each of the following is a successive layer in which information security is achieved except __________. A. products B. purposes C. procedures D. people

A

B. purposes

95
Q

By definition - a(n) __________ is a person or thing that has the power to carry out a threat. A. vulnerability B. exploit C. threat agent D. risk

A

C. threat agent

96
Q

__________ ensures that the individual is who they claim to be. A. authentication B. accounting C. access control D. certification

A

A. authentication

97
Q

Each of the following is a goal of information security except __________. A foil cyberterrosim B. avoid legal consequences C. decreases user productivity D. prevent data theft

A

C. decreases user productivity

98
Q

The __________ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it. A. Hospital Protection and Insurance Association Agreement (HPIAA) B. Sarbanes-Oxley Act (Sarbox) C. Gramm-Leach-Bliley Act (GLBA) D. Health Insurance Portability and Accountability Act (HIPAA)

A

D. Health Insurance Portability and Accountability Act (HIPAA)

99
Q

Utility companies - telecommunications - and financial services are considered prime targets of __________ because attackers can significantly disrupt business and personal activities by destroying a few targets. A. white hat hackers B. script kiddies C. computer spies D. cyberterrorists

A

D. cyberterrorists

100
Q

After an attacker has probed a network for information - the next step is to __________. A. penetrate any defenses B. paralyze networks and devices C. circulate to other systems D. modify security settings

A

A. penetrate any defenses