Chapter 14: Security Flashcards

1
Q

What two keys are used for Symmetric Key Cryptography encryption and decryption?

A

Both Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two keys are used for Asymmetric Key Cryptography encryption and decryption ?

A

Encry = Public
Decry = Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kinds of encryption algorithms are used for Symmetric Key Encrypt (Secret-Key Cryptography) ?

A

AES (Advanced Encryption Standard)
DES (Data Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kinds of encryption algorithms are used for Asymmetric Key Encrypt (Public-Key Cryptography) ?

A

RSA (Rivest-Shamir-Adleman)
ECC (Elliptic Curve Cryptography)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is defense in depth ?

A

security strategy that employs multiple layers of defense to protect against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What 4 methods can be used to access drop boxes ?

A

Web Browser
Desktop Applications
Mobile Applications
APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three types of factors of authentication ?

A

Something you know - PW
Something you are - biometrics
Something you have - keycard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of breach is Unauthorized reading of data ?

A

Breach of Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of breach is Unauthorized modification of data ?

A

Breach of Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of breach is Unauthorized destruction of data ?

A

Breach of Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of breach is Unauthorized use of resources ?

A

Theft of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of breach is Preventing legitimate use of the system ?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some pros and cons of symmetric key encryption ?

A

efficient and fast but requires secure management of the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some pros and cons of asymmetric key encryption ?

A

enhances security by eliminating the need for key exchange but is slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly