12.0 Flashcards

1
Q

What are the three primary goals of security?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality best practices?

A

Use firewalls, acls, require appropriate credentials, encrypt traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two basic forms of encryption?

A

Symmetric and Asymmetric Encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the 3 Symmetric Encryption Algorithms

A

DES, 3DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES is available in what key versions?

A

128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe one of the most popular Asymmetric algorithm in use today

A

RSA: used as part of a PKI system, which uses digital certs and a CA to authentication and encryption services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does integrity ensure?

A

Ensures that data has not been modified in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hashing is one approach to data integrity, what are two of the most common hashing algorithms?

A

MD5 (Message Digest 5), Secure Hash Algorithm 1 (SHA-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Availability of data is a measure of the data’s _____.

A

Accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3DES Key Length

A

168

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MD5 Key Length

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DES KL

A

56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES KL

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SHA-1 KY

A

160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly