chapter 10 Flashcards
Since \_\_\_\_, the Federal Rules of Civil Procedure require the inclusion of electronically-stored information when responding to discovery requests. A. 2000 B. 2002 C. 2004 D. 2006 E. 2008
D. 2006
Data-at-rest used by a cloud-based appliaction is: A. always encrypted B. generally encrypted C. generally not encrypted D. never encrypted E. it is impossible to say
C. generally not encrypted
\_\_\_\_ is the "residual representation of data that has been in some way nominally erased or removed." A. Exchanged data B. Data remanenece C. Cleared data D. Released data E. Sanitized data
B. Data remanenece
. \_\_\_\_ refers to the process of eradicating data on media before reusing the media in an environment that provides an acceptable level of protection for the data that was on the media before clearing. A. Erasing B. Recycling C. Sanitization D. Clearing E. Cleaning
D. Clearing
____ refers to the process of removing the data from the media before reusing the media in an environment that does not provide an acceptable level of protection
for the data that was on the media before sanitizing.
A. Erasing
B. Recycling
C. Sanitization
D. Clearing
E. Cleaning
C. Sanitization
In \_\_\_\_\_\_ encryption, the same key is used to encrypt and decrypt the message. A. equivalent B. symmetric C. private D. public E. asymmetric
B. symmetric
In ______ encryption, different keys are used to encrypt and decrypt the message.
A. unequal B. symmetric C. asymmetric D. enhanced E. private
C. asymmetric
Key lengths should be a minimum of \_\_\_\_ for Triple DES (Data Encryption Standard). A. 56 bits B. 100 bits C. 112 bits D. 128 bits E. 256 bits
C. 112 bits
Key lengths should be a minimum of \_\_\_\_ for AES (Advanced Encryption Standard). A. 56 bits B. 100 bits C. 112 bits D. 128 bits E. 256 bits
D. 128 bits
The acronym OASIS stands for:
A. Open Access to Similar Information Standards
B. Organization for the Advancement of Structured Information Standards.
C. Organizational Area of Searching Industrial Standards
D. Office for the Administration of Supported Information Structures
E. none of the above
B. Organization for the Advancement of Structured Information Standards.
Which of the following are both generated and verified using the same secret key?
A. hash functions and tags B. private keys and public keys C. MAC values and digital signatures D. symmetric algorithms and asymmetric algorithms E. none of the above
C. MAC values and digital signatures
MAC algorithms can be constructed from which of the following? A. universal hashing B. cryptographic has functions C. block cipher algorithms D. all of the above E. none of the above
D. all of the above
In an encryption context, the acronym MAC stands for: A. message authentication code B. maximum access code C. medium access control D. mid-range access code E. macro authentication controller
A. message authentication code
The simplest way to use MACs on encrypted data is to use: A. a streaming symmetric algorithm B. a block symmetric algorithm C. an asymmetric algorithm D. all of the above E. none of the above
B. a block symmetric algorithm
Use of MACs (message authentication codes) ensure: A. confidentiality B. integrity C. availability D. authentication E. access control
B. integrity
The two basic components required for the encryption of data include:
A. an algorithm and a key
B. a private key and a public key
C. cipher text and an algorithm
D. a sender and a recipient
E. a key generator and a management mechanism
A. an algorithm and a key
Whenever possible, keys should be distributed by: A. personal means B. private means C. electronic means D. physical means E. manual means
C. electronic means
In asymmetric encryption, the encryption key is known as the: A. public key B. personal key C. private key D. paired key E. certified key
A. public key
In asymmetric encryption, the decryption key is known as the: A. public key B. personal key C. private key D. paired key E. certified key
C. private key
The public and private keys are known as a(n): A. key combination B. asymmetric pair C. symmetric pair D. key pair E. electronic pair
D. key pair
A PKI (public key infrastructure) makes use of which of the following components? A. registration authority B. verification authority C. certification authority D. all of the above E. none of the above
D. all of the above
Within a PKI (public key infrastructure), which of the following components is responsible for registering the details of a new user of the PKI? A. assessment authority B. registration authority C. verification authority D. certification authority E. both A and C
B. registration authority
Within a PKI (public key infrastructure), which of the following components is responsible issuing/canceling certificates for user public keys? A. assessment authority B. registration authority C. verification authority D. certification authority E. both B and D
D. certification authority
Within a PKI (public key infrastructure), which of the following components is responsible for determining whether a certificate is valid and for what purpose it has been issued? A. assessment authority B. registration authority C. verification authority D. certification authority E. none of the above
C. verification authority