1.4.4, 1.4.2, and 1.4.5 Flashcards

1
Q

What does obfuscation refer to in the context of cybersecurity?

A

Intentionally making data unclear or difficult to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which obfuscation technique involves hiding information within images, audio files, or other multimedia?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the process of replacing Personally Identifiable Information (PII) data with a random value using a table called?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key requirement for tokenization to add another layer of security to the data?

A

Keeping the table used for tokenization secret/secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which obfuscation technique involves replacing, encrypting, or scrambling sensitive information while maintaining usability for testing or analytics purposes?

A

Data masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does data masking involve?

A

Substituting real data with fictional or partially anonymized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of obfuscation techniques in enhancing data security and privacy?

A

To protect sensitive information from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which term is defined as the process of hiding information to prevent its detection?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does hashing commonly store for authentication purposes?

A

Plaintext passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the importance of obfuscation in a broader security strategy?

A

It complements other security measures such as encryption and access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of encryption?

A

To prevent unauthorized access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which level of encryption encrypts the entire storage device?

A

Full-disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of encryption employs a single key for both encryption and decryption?

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a critical element in encryption that involves the secure transmission of cryptographic keys between parties?

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which element of encryption influences the effectiveness of security and is typically measured in bits?

A

Key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT a type of encryption algorithm mentioned in the text?

17
Q

Which encryption type uses a pair of keys, public and private?

A

Asymmetric encryption

18
Q

What does AES stand for in encryption?

A

Advanced Encryption Standard

19
Q

What does DES stand for in encryption?

A

Digital Encryption Standard

20
Q

Which level of encryption focuses on securing data within a database?

A

Database encryption

21
Q

What is the primary definition of cryptography?

A

The practice or study of writing or solving codes

22
Q

What term refers to the art or study of solving encryptions without knowing the key?

A

Cryptanalysis

23
Q

What is the purpose of a cipher or key in cryptography?

A

To encrypt or decrypt messages

24
Q

Why is it important to keep cryptographic keys private?

A

To prevent unauthorized access to ciphertext

25
What is the purpose of salting in password hashing?
To protect against dictionary attacks
26
What is the primary application of hashing in cryptography?
Storing passwords
27
What is the purpose of authenticated modes of encryption?
To validate the integrity of the ciphertext
28
What is the primary feature of the blockchain?
Public and immutable ledger
29
How does blockchain ensure data integrity?
By preventing data alteration through repetitive hashing