4.3 Security Architecture and Tool Sets Flashcards

1
Q

what are the two types of ciphers?

A

block and streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is most commonly used to provide proof of message’s origin?

A

a digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which key is used to decrypt a digital signature: public or private?

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which cryptographic technique is based on a combination of two keys: a secret (private) key and a public key?

A

public-key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in asymmetric encryption for a digital signature, which key is used for encryption: public or private?

A

private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are mandatory vacations?

A

administrative controls that ensure that employees take vacations at periodic intervals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are two other names for single-key cryptography?

A

symmetric key encryption and secret-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which type of cryptography is more secure: symmetric or asymmetric?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which security measure prevents fraud by reducing the chances of collusion?

A

separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the three issues that symmetric data encryption fails to address?

A

data integrity, repudiation, scalable key distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

to provide checks and balances and to prevent one person from gaining too much power over a system, which type of security policy should you implement?

A

separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the term for the process that applies a one-way mathematical function called a message digest function to an arbitrary amount of data?

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a dual control?

A

when two operators work together to accomplish a sensitive task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is segregation of duties?

A

when a sensitive activity is segregated into multiple activities and tasks are assigned to different individuals to achieve a common goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is another name for public-key encryption?

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is another term used for layered security?

A

defense in depth

17
Q

what is job rotation?

A

when an individual can fulfill the tasks of more than one position in the organization and duties are regularly rotated to prevent fraud

18
Q

what is the opposite of confidentiality?

A

disclosure