Comptia+ Chapter 3 Flashcards

1
Q

Steganography

A

Hiding the existence of data within another type of file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Metadata

A

Data that is used to describe the content or structure of the actual data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data masking

A

Creating a copy of the original data and making it unintelligible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tokenization

A

Obscures sensitive data elements into a random string of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography

A

Practice of transforming information so that it is secure and cannot be understood by unauthorized persons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

The process of changing plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decryption

A

Process of changing encrypted text into original text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm (cipher)

A

Set of procedures based on a mathematical formula used to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mitigation

A

Reducing the vulnerability or severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hardening

A

Making a system more resilient to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nonrepudiation

A

Process of proving that a user performed an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Obfuscation

A

Making something obscure or unclear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A

Process of creating a digital fingerprint that protects the integrity of data proving it has not been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric cryptographic algorithms

A

Encryption that uses a single key to encrypt and decrypt a message, also called private key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric cryptography algorithms

A

Cryptography that uses two mathematically related keys, also public key to encrypt and a private key to decrypt, also know as public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital signature

A

Electronic verification of the sender

17
Q

Key exchange

A

The process of sending and receiving secure cryptographic keys

18
Q

Blockchain

A

A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network

19
Q

Collision

A

When two files have the same hash

20
Q

Collision attack

A

Attempt to find two input strings of a has function that produce the same hash result