chapter 10 Flashcards

1
Q
Since \_\_\_\_, the Federal Rules of Civil Procedure require the inclusion of electronically-stored information when responding to discovery requests.
A. 2000
B. 2002
C. 2004
D. 2006
E. 2008
A

D. 2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Data-at-rest used by a cloud-based appliaction is:
A. always encrypted
B. generally encrypted
C. generally not encrypted
D. never encrypted
E. it is impossible to say
A

C. generally not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
\_\_\_\_ is the "residual representation of data that has been in some way nominally
erased or removed."
A. Exchanged data
B. Data remanenece
C. Cleared data
D. Released data
E. Sanitized data
A

B. Data remanenece

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
. \_\_\_\_ refers to the process of eradicating data on media before reusing the media in an environment that provides an acceptable level of protection for the data that was on the media before clearing.
A. Erasing
B. Recycling
C. Sanitization
D. Clearing
E. Cleaning
A

D. Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ refers to the process of removing the data from the media before reusing the media in an environment that does not provide an acceptable level of protection
for the data that was on the media before sanitizing.
A. Erasing
B. Recycling
C. Sanitization
D. Clearing
E. Cleaning

A

C. Sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
In \_\_\_\_\_\_ encryption, the same key is used to encrypt and decrypt the message.
A. equivalent
B. symmetric
C. private
D. public
E. asymmetric
A

B. symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In ______ encryption, different keys are used to encrypt and decrypt the message.

A. unequal
B. symmetric
C. asymmetric
D. enhanced
E. private
A

C. asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Key lengths should be a minimum of \_\_\_\_ for Triple DES (Data Encryption Standard).
A. 56 bits
B. 100 bits
C. 112 bits
D. 128 bits
E. 256 bits
A

C. 112 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Key lengths should be a minimum of \_\_\_\_ for AES (Advanced Encryption Standard).
A. 56 bits
B. 100 bits
C. 112 bits
D. 128 bits
E. 256 bits
A

D. 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The acronym OASIS stands for:
A. Open Access to Similar Information Standards
B. Organization for the Advancement of Structured Information Standards.
C. Organizational Area of Searching Industrial Standards
D. Office for the Administration of Supported Information Structures
E. none of the above

A

B. Organization for the Advancement of Structured Information Standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are both generated and verified using the same secret key?

A. hash functions and tags
B. private keys and public keys
C. MAC values and digital signatures
D. symmetric algorithms and asymmetric algorithms
E. none of the above
A

C. MAC values and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
MAC algorithms can be constructed from which of the following?
A. universal hashing
B. cryptographic has functions
C. block cipher algorithms
D. all of the above
E. none of the above
A

D. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
In an encryption context, the acronym MAC stands for:
A. message authentication code
B. maximum access code
C. medium access control
D. mid-range access code
E. macro authentication controller
A

A. message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The simplest way to use MACs on encrypted data is to use:
A. a streaming symmetric algorithm
B. a block symmetric algorithm
C. an asymmetric algorithm
D. all of the above
E. none of the above
A

B. a block symmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Use of MACs (message authentication codes) ensure:
A. confidentiality
B. integrity
C. availability
D. authentication
E. access control
A

B. integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The two basic components required for the encryption of data include:
A. an algorithm and a key
B. a private key and a public key
C. cipher text and an algorithm
D. a sender and a recipient
E. a key generator and a management mechanism

A

A. an algorithm and a key

17
Q
Whenever possible, keys should be distributed by:
A. personal means
B. private means
C. electronic means
D. physical means
E. manual means
A

C. electronic means

18
Q
In asymmetric encryption, the encryption key is known as the:
A. public key
B. personal key
C. private key
D. paired key
E. certified key
A

A. public key

19
Q
In asymmetric encryption, the decryption key is known as the:
A. public key
B. personal key
C. private key
D. paired key
E. certified key
A

C. private key

20
Q
The public and private keys are known as a(n):
A. key combination
B. asymmetric pair
C. symmetric pair
D. key pair
E. electronic pair
A

D. key pair

21
Q
A PKI (public key infrastructure) makes use of which of the following components?
A. registration authority
B. verification authority
C. certification authority
D. all of the above
E. none of the above
A

D. all of the above

22
Q
Within a PKI (public key infrastructure), which of the following components is responsible for registering
 the details of a new user of the PKI?
A. assessment authority
B. registration authority
C. verification authority
D. certification authority
E. both A and C
A

B. registration authority

23
Q
Within a PKI (public key infrastructure), which of the following components is responsible issuing/canceling certificates for user public keys?
A. assessment authority
B. registration authority
C. verification authority
D. certification authority
E. both B and D
A

D. certification authority

24
Q
Within a PKI (public key infrastructure), which of the following components is responsible for determining
whether a certificate is valid and for what purpose it
has been issued?
A. assessment authority
B. registration authority
C. verification authority
D. certification authority
E. none of the above
A

C. verification authority

25
Q

Which of the following statements is NOT true?
A. Every key should have an expiry date.
B. Once a key has expired, a new key should be chosen and the old key should be destroyed.
C. The longer a key is in use, the less chance there is of it being compromised.
D. New keys should generally be longer than old keys.
E. Both A and D

A

C. The longer a key is in use, the less chance there is of it being compromised.