12 Flashcards

1
Q

What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)

A
  • Asymmetric encryption
  • Low processing power requirements
  • Suitable for small wireless devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refers to a solution designed to strengthen the security of session keys?

A

PFS (Perfect Forward Secrecy).

PFS is a cryptographic technique that enhances the security of session keys by ensuring that even if a long-term secret key is compromised, it cannot be used to decrypt past or future communication sessions. This adds an extra layer of security to protect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An emerging field of advanced computing technologies based on the principles of physics is known as:

A

** Quantum computing **

Quantum computing is a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to predictions, the most future-proof cryptographic solution should be:

A

** Post-quantum cryptography **

The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An asymmetric encryption key designed to be used only for a single session or transaction is known as:

A

** Ephemeral key **

asymmetric encryption key designed to be used only for a single session or transaction is Ephemeral key. Ephemeral keys are generated for temporary use and are typically used in secure communication protocols to provide forward secrecy, ensuring that the compromise of one session’s key does not compromise the security of past or future sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the characteristic features of a session key? (Select 2 answers)

A
  • Used during a single session
  • Symmetric key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term “Blockchain” refers to a decentralized digital ledger system (i.e. a specific type of a distributed database) stored across multiple computers in a P2P network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use?

A

** ECB **

ECB was originally designed to encrypt messages that never span more than a single block, such as to encrypt keys to distribute for other operations. However, using ECB on a message that’s longer than a single block results in the leak of a bit per block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the block cipher modes listed below provides both data integrity and confidentiality?

A

** GCM **

Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption.)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)

A
  • Session-key encryption
  • Symmetric encryption
  • Secret-key encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric encryption algorithms require large amounts of processing power for both encryption and decryption of data which makes them much slower in comparison to asymmetric encryption ciphers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the algorithms listed below does not belong to the category of symmetric ciphers?

A

** RSA **

RSA is a type of asymmetric encryption, which uses two different but linked keys. In RSA cryptography, both the public and the private keys can encrypt a message. The opposite key from the one used to encrypt a message is used to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the algorithms listed below does not fall into the category of asymmetric encryption?

A

** AES **
->Advanced Encryption Standard

AES is a symmetric algorithm which uses the same 128, 192, or 256 bit key for both encryption and decryption

17
Q

Which of the following terms illustrate the security through obscurity concept? (Select all that apply)

A
  • Code obfuscation
    -> Obfuscation means to make something difficult to understand. Programming code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program. Encrypting some or all of a program’s code is one obfuscation method.
  • Steganography
    -> Steganography is the practice of concealing information within another message or physical object to avoid detection
18
Q

What is the purpose of steganography?

A

Hiding data within another piece of data

19
Q

Which of the following enables processing data in an encrypted form?

A

** Homomorphic encryption **

Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form. Homomorphic encryption enables complex mathematical operations to be performed on encrypted data without compromising the encryption.

20
Q

Which cryptographic solution would be best suited for low-power devices?

A

** ECC **

Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.

21
Q

Which of the following terms applies to the concept of confidentiality?

A

Encryption

22
Q

Which of the following terms applies to the concept of data integrity?

A

Hashing

23
Q

Which of the following terms applies to the concept of obfuscation?

A

Security through obscurity

24
Q

Which of the following terms applies to the authentication process?

A

** MFA **

Multi-factor authentication (MFA) is a multi-step account login process that requires users to enter more information than just a password.

25
Q

Which of the following terms applies to the concept of non-repudiation?

A

Digital certificate