1.4.4, 1.4.2, and 1.4.5 Flashcards

1
Q

What does obfuscation refer to in the context of cybersecurity?

A

Intentionally making data unclear or difficult to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which obfuscation technique involves hiding information within images, audio files, or other multimedia?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the process of replacing Personally Identifiable Information (PII) data with a random value using a table called?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key requirement for tokenization to add another layer of security to the data?

A

Keeping the table used for tokenization secret/secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which obfuscation technique involves replacing, encrypting, or scrambling sensitive information while maintaining usability for testing or analytics purposes?

A

Data masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does data masking involve?

A

Substituting real data with fictional or partially anonymized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of obfuscation techniques in enhancing data security and privacy?

A

To protect sensitive information from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which term is defined as the process of hiding information to prevent its detection?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does hashing commonly store for authentication purposes?

A

Plaintext passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the importance of obfuscation in a broader security strategy?

A

It complements other security measures such as encryption and access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of encryption?

A

To prevent unauthorized access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which level of encryption encrypts the entire storage device?

A

Full-disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of encryption employs a single key for both encryption and decryption?

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a critical element in encryption that involves the secure transmission of cryptographic keys between parties?

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which element of encryption influences the effectiveness of security and is typically measured in bits?

A

Key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT a type of encryption algorithm mentioned in the text?

17
Q

Which encryption type uses a pair of keys, public and private?

A

Asymmetric encryption

18
Q

What does AES stand for in encryption?

A

Advanced Encryption Standard

19
Q

What does DES stand for in encryption?

A

Digital Encryption Standard

20
Q

Which level of encryption focuses on securing data within a database?

A

Database encryption

21
Q

What is the primary definition of cryptography?

A

The practice or study of writing or solving codes

22
Q

What term refers to the art or study of solving encryptions without knowing the key?

A

Cryptanalysis

23
Q

What is the purpose of a cipher or key in cryptography?

A

To encrypt or decrypt messages

24
Q

Why is it important to keep cryptographic keys private?

A

To prevent unauthorized access to ciphertext

25
Q

What is the purpose of salting in password hashing?

A

To protect against dictionary attacks

26
Q

What is the primary application of hashing in cryptography?

A

Storing passwords

27
Q

What is the purpose of authenticated modes of encryption?

A

To validate the integrity of the ciphertext

28
Q

What is the primary feature of the blockchain?

A

Public and immutable ledger

29
Q

How does blockchain ensure data integrity?

A

By preventing data alteration through repetitive hashing