CH1 Flashcards

1
Q

What type of attack is snooping

A
  • Passive Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

……. attack violate integrity by allowing attackers to impersonate legitimate entities

A

Masquerading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a Repudiation, What principle does it violate and what type of attack is it ?

A
  • Repusiation is attcker denies having participated in that transaction or communication.
  • Threat of integrity
  • active attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the security services :

A
  • Data confidentiality
  • Data integrity
  • Nonrepudiation
  • Authentication
  • Access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which security services does encipherment refers to?

A
  • Data Integrity
  • Data Confidentiality
  • Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which security services does Digital Signature refers to?

A
  • Nonrepudiation
  • Authentication
  • Data integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the security mechanisms for Nonrepudiation?

A
  • Data integrity
  • Digital Signature
  • notarization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptology is a field both of?

A

Cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does cryptography solve?

A
  • Confidentiality, integrity, availability, identity and non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are some examples of symmetric encryption?

A
  • DES (Data Encryption Standard)
  • AES(Advanced Encryption Standard)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are two examples of Substitution Cipher?

A
  • Caesar cipher
  • Atbash cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Messages encrypted with the private key can
only be decrypted with the public key.

A

Asymmetric Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which one is slower:
- Asymmetric-Key
- Symmetric-Key

A

Asymmetric-Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why does is the Asymmetric key slower than the symmetric key?

A

because the key is longer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly