1100 Flashcards
A symmetric cipher that was designed to replace DES.
Triple Data Encryption Standard (3DES)
A chip on the motherboard of the computer that provides cryptographic services.
Trusted Platform Module (TPM)
A later derivation of the Blowfish algorithm that is considered to be strong.
Twofish
Cryptography that can be applied to entire disks.
Whole Disk Encryption
What is data called that is to be encrypted by inputting into an encryption algorithm? A. Plaintext B. Cleartext C. Opentext D. Ciphertext
A. Plaintext
Which of the following is not a basic security protection over information that cryptography can provide? A. confidentiality B. Stop loss C. Integrity D. Authenticity
B. Stop loss
The areas of a file in which steganography can hide include all of the following except __________.
A. in data that is used to describe the content or structure of the actual data
B. in the directory structure of the file system
C. in the file header fields that describe the file
D. in areas that contain the content data itself
B. in the directory structure of the file system
Proving that a user sent an e-mail message is known as ______. A. repudiation B. integrity C. nonrepudiation D. availability
C. nonrepudiation
Symmetric cryptographic algorithms are also called _________. A. private key cryptographyB. cipherkey cryptographyC. public/private key cryptographyD. public key cryptography
A. private key cryptography
A(n) __________ is not decrypted - but is only used for comparison purposes. A. stream B. hash C. algorithm D. key
B. hash
Each of the following is a characteristic of a secure hash algorithm except ____________. A. collisions should be rareB. the results of a hash function should not be reversedC. the hash should always be the same fixed sizeD. a message cannot be produced from a predefined has A. collisions should be rare B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined has
A. collisions should be rare
A(n) __________ is not decrypted - but is only used for comparison purposes. A. stream B. hash C. algorithm D. key
B. encrypting and decrypting e-mail attachments
___________ encrypts a hash with a shared secret key. A. Key_hashB. WEPC. MDRIPED. Hashed Message Authentication Code (HMAC) A. Key_hash B. WEP C. MDRIPE D. Hashed Message Authentication Code (HMAC)
D. Hashed Message Authentication Code (HMAC)
Which of the following is a protection provided by hashing? A. AuthenticityB. ConfidentialityC. IntegrityD. Availability A. Authenticity B. Confidentiality C. Integrity D. Availability
C. Integrity
__________ is a hash that uses two different and independent parallel chains of computation - the results of which are then combined at the end of the process. A. DESB. AESC. RC4D. RIPEMD A. DES B. AES C. RC4 D. RIPEMD
D. RIPEMD
Which of the following is the strongest symmetric cryptographic algorithm? A. Advanced Encryption StandardB. Data Encryption StandardC. Triple Data Encryption StandardD. Rivest Cipher (RC) 1 A. Advanced Encryption Standard B. Data Encryption Standard C. Triple Data Encryption Standard D. Rivest Cipher (RC) 1
A. Advanced Encryption Standard
If Bob want to send a secure message to Alice using an asymmetric cryptographic algorithm - the key he uses to encrypt the message is __________. A. Alice’s private keyB. Alice’s public keyC. Bob’s public keyD. Bob’s private key A. Alice’s private key B. Alice’s public key C. Bob’s public key D. Bob’s private key
B. Alice’s public key
A digital signature can provide each of the following benefits except __________. A. prove the integrity of the messageB. verify the receiverC. verify the senderD. enforce nonrepudiation A. prove the integrity of the message B. verify the receiver C. verify the sender D. enforce nonrepudiation
B. verify the receiver
Which of the following asymmetric cryptographic algorithms is the most secure? A. MEC-2B. RSAC. MD-17D. SHA-2 A. MEC-2 B. RSA C. MD-17 D. SHA-2
B. RSA
Which of the following asymmetric encryption algorithms uses prime numbers? A. EFSB. Quantum computingC. ECCD. RSA A. EFS B. Quantum computing C. ECC D. RSA
D. RSA
__________ uses lattice-based cryptography and may be more resistant to quantum computing attacks. A. NTRUEncryptB. ECCC. RC4D. SHA-512 A. NTRUEncrypt B. ECC C. RC4 D. SHA-512
A. NTRUEncrypt
The Trusted Platform Module (TPM) __________. A. allows the user to boot a corrupted disk and repair it B. is only available on Windows computers running BitLocker C. includes a pseudorandom number generator (PRNG) D. provides cryptographic services in hardware instead of software
D. provides cryptographic services in hardware instead of software
Which of the following has an onboard key generator and key storage facility - accelerated symmetric and asymmetric encryption - and can back up sensitive material in encrypted form? A. Trusted Platform Module (TPM) B. Self-encrypting hard disk drives (HDDs) C. Encrypted hardware-based USB devices D. Hardware Security Module (HSM)
D. Hardware Security Module (HSM)
The Microsoft Windows LAN Manager hash ___________. A. is weaker than NTLMv2 B. is part of BitLocker C. is required to be present when using TPM D. is identical to MD-4
A. is weaker than NTLMv2
A trust model with one CA that acts as a facilitator to interconnect all other CA’s.
Bridge Trust Model
A trusted third-party agency that is responsible for issuing the digital certificates.
Certificate Authority (CA)
A publicly accessible centralized directory that contains digital certificates that can be used to view the status of a digital certificate.
Certificate Repository (CR)
A repository that lists revoked digital certificates.
Certificate Revocation List (CRL)
A technology used to associate a user’s identity to a public key - in which the user’s public key is “digitally signed” by a trusted third-party.
Digital Certificate
A type of trust model in which a relationship exists between two individuals because one person knows the other person.
Direct Trust
A trust model that has multiple CA’s that sign digital certificates.
Distributed Trust Model
A trust model that has a single hierarchy with one master CA.
Hierarchical Trust Model
A secure version of HTTP sent over SSL/TLS.
Hypertext Transport Protocol Over Secure Sockets Layer (HTTPS)
A set of protocols developed to support the secure exchange of packets.
IP Security (IPsec)
A process in which keys are managed by a third party - such as a trusted CA called the root.
Key Escrow
A highly trusted person responsible for recovering lost or damaged digital certificates.
Key Recovery Agent (KRA)
A technique to recover a private key by distributing parts to different individuals.
M-of-N Control
A framework for all of the entities involved in digital certificates for digital certificate management.
Public Key Infrastructure (PKI)
A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
Registration Authority (RA)
A UNIX-based command interface and protocol for securely accessing a remote computer.
Secure Shell (SSH)