chap4 Flashcards

1
Q

is the science of making and breaking secret codes.

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modern cryptography uses computationally secure algorithms

A

tru

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The history of cryptography started in

A

diplomatic circles thousands of years ago

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each encryption method uses a specific algorithm, called a

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a series of well-defined steps used to encrypt and
decrypt messages.

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

There are several methods of creating ciphertext

A

▪ Transposition
▪ Substitution
▪ One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The roots of cryptography are
found in

A

Egyptian and Roman
civilizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The first known evidence of
cryptography can be traced to the
use of

A

hieroglyph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The earlier Roman method of cryptography, popularly known as the

A

Caesar
Shift Cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two Types of Encryption

A

Symmetric algorithms
ASymmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

15th century gave birth to

A

Vigenère Coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These algorithms use the same pre-shared key

A

Symmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use one key to
encrypt data and a different key to decrypt data.

A

▪ Asymmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a symmetric block
cipher with 64-bit block size

A

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

64 blocks
128 keys.

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

fixed 128

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

uses the product of two very large prime
numbers

A

Rivest_Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

provides an electronic exchange

A

Diffie-Hellman -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

uses the U.S. government standard for digital signatures.

A

ElGamal

19
Q

uses elliptic curves

A

Elliptic Curve Cryptography

20
Q

Difference between symmetric and asymmetric

A

Symmetric more
efficient and can handle more data.
Asymmetric more efficient at protecting the confidentiality of
small amounts of data

21
Q

application of cryptohraphy

A

one-time password-generating token
▪ Internet Key Exchange
Secure Socket Layer
Secure Shell

22
Q

a private network that uses a public network

A

VPN

23
Q

services allow for authentication, integrity

A

ipsec

24
Q

actual barriers deployed to prevent direct contact
with systems.

A

Physical Access Controls

25
Q

hardware and software solutions to manage
access to resources

A

Logical Access Controls

26
Q
  • policies and procedures defined by
    organizations
A

Administrative Access Controls

27
Q
  • restricts the actions that a subject can
    perform on an object
A

Mandatory access control

28
Q

grants or restricts object access
determined by the object’s owner.

A

Discretionary access control

29
Q

based on the role of the subject.

A

Role-based

30
Q

Rule-based access control -

A

Rule-based access control -

31
Q

enforces the rules established by the authorization policy

A

Identification

32
Q

Authentication Methods

A

What You Know
What You Have
Who You Are
Multi-factor Authentication

33
Q

controls what a user can and cannot do on the network

A

Authorization

34
Q

traces an action back to a person or process

A

Accountability

35
Q

Prevent means

A

Preventative Controls

36
Q

opposite of a reward.

A

Deterrent Controls

37
Q

the act or process of noticing

A

Detective Controls

38
Q

counteracts something that is undesirable.

A

Corrective Controls

39
Q

is a return to a normal state

A

Recovery Controls

40
Q

means to make up for something.

A

Compensative Controls

41
Q

is a technology that secures data

A

Data Masking

42
Q

replaces data with authentic looking

A

▪ Substitution

43
Q

Shuffling

A

substitution set from the same column

44
Q

conceals data

A

Steganography

45
Q

use and practice of data masking

A

Data obfuscation