chapter 10 Flashcards
Since \_\_\_\_, the Federal Rules of Civil Procedure require the inclusion of electronically-stored information when responding to discovery requests. A. 2000 B. 2002 C. 2004 D. 2006 E. 2008
D. 2006
Data-at-rest used by a cloud-based appliaction is: A. always encrypted B. generally encrypted C. generally not encrypted D. never encrypted E. it is impossible to say
C. generally not encrypted
\_\_\_\_ is the "residual representation of data that has been in some way nominally erased or removed." A. Exchanged data B. Data remanenece C. Cleared data D. Released data E. Sanitized data
B. Data remanenece
. \_\_\_\_ refers to the process of eradicating data on media before reusing the media in an environment that provides an acceptable level of protection for the data that was on the media before clearing. A. Erasing B. Recycling C. Sanitization D. Clearing E. Cleaning
D. Clearing
____ refers to the process of removing the data from the media before reusing the media in an environment that does not provide an acceptable level of protection
for the data that was on the media before sanitizing.
A. Erasing
B. Recycling
C. Sanitization
D. Clearing
E. Cleaning
C. Sanitization
In \_\_\_\_\_\_ encryption, the same key is used to encrypt and decrypt the message. A. equivalent B. symmetric C. private D. public E. asymmetric
B. symmetric
In ______ encryption, different keys are used to encrypt and decrypt the message.
A. unequal B. symmetric C. asymmetric D. enhanced E. private
C. asymmetric
Key lengths should be a minimum of \_\_\_\_ for Triple DES (Data Encryption Standard). A. 56 bits B. 100 bits C. 112 bits D. 128 bits E. 256 bits
C. 112 bits
Key lengths should be a minimum of \_\_\_\_ for AES (Advanced Encryption Standard). A. 56 bits B. 100 bits C. 112 bits D. 128 bits E. 256 bits
D. 128 bits
The acronym OASIS stands for:
A. Open Access to Similar Information Standards
B. Organization for the Advancement of Structured Information Standards.
C. Organizational Area of Searching Industrial Standards
D. Office for the Administration of Supported Information Structures
E. none of the above
B. Organization for the Advancement of Structured Information Standards.
Which of the following are both generated and verified using the same secret key?
A. hash functions and tags B. private keys and public keys C. MAC values and digital signatures D. symmetric algorithms and asymmetric algorithms E. none of the above
C. MAC values and digital signatures
MAC algorithms can be constructed from which of the following? A. universal hashing B. cryptographic has functions C. block cipher algorithms D. all of the above E. none of the above
D. all of the above
In an encryption context, the acronym MAC stands for: A. message authentication code B. maximum access code C. medium access control D. mid-range access code E. macro authentication controller
A. message authentication code
The simplest way to use MACs on encrypted data is to use: A. a streaming symmetric algorithm B. a block symmetric algorithm C. an asymmetric algorithm D. all of the above E. none of the above
B. a block symmetric algorithm
Use of MACs (message authentication codes) ensure: A. confidentiality B. integrity C. availability D. authentication E. access control
B. integrity