chap4 Flashcards

1
Q

is the science of making and breaking secret codes.

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modern cryptography uses computationally secure algorithms

A

tru

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The history of cryptography started in

A

diplomatic circles thousands of years ago

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each encryption method uses a specific algorithm, called a

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a series of well-defined steps used to encrypt and
decrypt messages.

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

There are several methods of creating ciphertext

A

▪ Transposition
▪ Substitution
▪ One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The roots of cryptography are
found in

A

Egyptian and Roman
civilizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The first known evidence of
cryptography can be traced to the
use of

A

hieroglyph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The earlier Roman method of cryptography, popularly known as the

A

Caesar
Shift Cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two Types of Encryption

A

Symmetric algorithms
ASymmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

15th century gave birth to

A

Vigenère Coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These algorithms use the same pre-shared key

A

Symmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use one key to
encrypt data and a different key to decrypt data.

A

▪ Asymmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a symmetric block
cipher with 64-bit block size

A

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

64 blocks
128 keys.

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

fixed 128

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

uses the product of two very large prime
numbers

A

Rivest_Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

provides an electronic exchange

A

Diffie-Hellman -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

uses the U.S. government standard for digital signatures.

19
Q

uses elliptic curves

A

Elliptic Curve Cryptography

20
Q

Difference between symmetric and asymmetric

A

Symmetric more
efficient and can handle more data.
Asymmetric more efficient at protecting the confidentiality of
small amounts of data

21
Q

application of cryptohraphy

A

one-time password-generating token
▪ Internet Key Exchange
Secure Socket Layer
Secure Shell

22
Q

a private network that uses a public network

23
Q

services allow for authentication, integrity

24
actual barriers deployed to prevent direct contact with systems.
Physical Access Controls
25
hardware and software solutions to manage access to resources
Logical Access Controls
26
- policies and procedures defined by organizations
Administrative Access Controls
27
- restricts the actions that a subject can perform on an object
Mandatory access control
28
grants or restricts object access determined by the object’s owner.
Discretionary access control
29
based on the role of the subject.
Role-based
30
Rule-based access control -
Rule-based access control -
31
enforces the rules established by the authorization policy
Identification
32
Authentication Methods
What You Know What You Have Who You Are Multi-factor Authentication
33
controls what a user can and cannot do on the network
Authorization
34
traces an action back to a person or process
Accountability
35
Prevent means
Preventative Controls
36
opposite of a reward.
Deterrent Controls
37
the act or process of noticing
Detective Controls
38
counteracts something that is undesirable.
Corrective Controls
39
is a return to a normal state
Recovery Controls
40
means to make up for something.
Compensative Controls
41
is a technology that secures data
Data Masking
42
replaces data with authentic looking
▪ Substitution
43
Shuffling
substitution set from the same column
44
conceals data
Steganography
45
use and practice of data masking
Data obfuscation