Chapter 2 Missed Questions Flashcards

1
Q

What is Asymmetric encryption?

A

Encryption and decryption use different keys from the same pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Symmetric encryption?

A

Encryption and decryption use the same secret keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ephemeral keys?

A

Keys that can only be used once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are stream ciphers?

A

Ciphers that operate on one character or bit of a message at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are block ciphers?

A

Ciphers that operate on large segments of the message at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a transposition chipher?

A

Ciphers that rearrange the characters in a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some popular Symmetric cryptography encryption algorithms?

A

DES, 3DES, AES, Blowfish, Twofish an RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some popular Asymmetric cryptography encryption algorithms?

A

RSA, PGP, and GnuPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Symmetric cryptography encryption algorithms are no longer used today?

A

DES, 3DES, Blowfish, and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the approved DSS (Digital Signature Standards) Encryption Algorithms?

A

DSA, RSA and ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What standard governs the structure and content of digital certificates?

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most effective method of revoking digital certificates?

A

OCSP (Online Certificate Status Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is certificate stapling?

A

A technology that allows web servers to attach an OCSP validation to the certificate they send to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is another name for a session key?

A

Ephemeral Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is SSL or TLS the more secure transport encryption technology?

A

TLS, SSL is no longer used because it is considered insecure, as well as TLS 1.1 and TLS 1.2. TLS 1.3 is the current transport encryption technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the metric used to provide the best measure of effectiveness in a biometric system?

A

CER (Crossover Error Rate)

17
Q

What are the acronyms FRR, FAR, and CER used for in measuring effectiveness? How are they calculated?

A

FRR is the False Rejection Rate, FAR is the False Acceptance Rate and CER is the Crossover Error Rate.
FRR = Times an Authorized User is Rejected.
FAR = Times an Unauthorized User is Accepted.
CER = Rate at which the FRR and FAR are equal.

18
Q

What is Zigbee?

A

A short-range wireless networking technology designed specifically for use in home automation technologies.

19
Q

What software development methodology uses four stages in an iterative process?

A

Spiral

20
Q

What phase of the capability maturity model introduces the reuse of code across projects?

A

Repeatable

21
Q

What component of a change management programs includes final testing that the software functions properly?

A

Release Management

22
Q

What is federation?

A

The term for policies, protocols, and practices to manage identities across systems and organizations

23
Q

What is composed of two doors closely spaced that require the user to use a card to get through one and then the other sequentially?

A

An access control vestibule

24
Q

What are common constraints for specialized and embedded systems?

A

Limitations on power, compute capacity, network throughput and bandwidth, cryptography, and cost. Additional issues with authentication and trust can also be driving factors.

25
Q

What are the 4 phases of a condensed penetration testing process, in order from start to finish?

A

Planning, Discovery, Attack, and Reporting

26
Q

What is “Services Integration”?

A

The connection of infrastructure and software elements to provide specific services to a business entity. More detailed is the processing, storage, databases, web, communications, and other functions into an integrated comprehensive solution.