6 Flashcards
What are the two types of Ciphers?
Stream and Block
Stream is byte by byte (byte=characters)
Block encrypts blocks of bytes at a time
Which of the following answers refer to an office equipment that combines the functionality of multiple devices? (Select 2 answers)
* MFD
* IoT
* MFP
* PED
* MFA
- MFD
- MFP
A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems, is known as:
* UNIX
* Windows NT
* POSIX
* RTOS
RTOS
An integrated circuit combining components normally found in a standard computer system is referred to as:
* HSM
* TPM
* SoC
* BIOS
SoC
A System on a Chip, or SoC
Which of the answers listed below refers to an IoT technology designed to provide communication between appliances in a home automation network?
* Ant+
* Zigbee
* NFC
* RFID
Zigbee
A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:
* MicroSD card
* Common Access Card (CAC)
* Proximity card
* Personal Identity Verification (PIV) card
Proximity card
What type of preventive physical access controls would provide a basic means for securing a door access? (Select 2 answers)
* Air gap
* Proximity card reader
* CCTV
* Industrial camouflage
* Smart card reader
- Proximity card reader
- Smart card reader
A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:
* Honeynet
* Virtual Private Network (VPN)
* Extranet
* Screened subnet
Screened subnet
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
* Standard format
* Overwriting data
* Degaussing
* Low-level format
Degaussing
Digital signatures provide: (Select 3 answers)
* Integrity
* Authentication
* Confidentiality
* Authorization
* Non-repudiation
* Accounting
- Integrity
- Authentication
- Non-repudiation
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.
* True
* False
True
In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.
* True
* False
True
Examples of key stretching algorithms include: (Select 2 answers)
* ROT13
* Twofish
* Bcrypt
* DSA
* PBKDF2
Bcrypt
PBKDF2
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?
* Seed
* IV
* Salt
* Shim
Salt
What are the Three Data states that need to be protected?
Data in Transit
Data at Rest
Data in Use