Domain 3 set 6 Flashcards

1
Q

A standard proposed by credit card issuers but never became widely adopted.

A

Secure electronic transaction (SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphers that use multiple alphabets on a rotating basis.

A

Polyalphabetic substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chosen Plaintext Attack

A

The attacker can create an encrypted message of his choice, to figure out the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES key lengths.

A

128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography

A

The science of protecting data so that it may be stored and transmitted between parties while preserving confidentiality and/or integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Twofish key length.

A

256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DES modes that allow errors to propagate.

A

CBC, CFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Frequency Analysis?

A

Used to detect patterns in ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital signatures use what type of algorithm?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NAND (not AND)

A

Logical function that is true only when one or both elements are false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AND

A

Logical function that is true only when both arguments are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 main product evaluation models?

A
  1. TCSEC Orange book
  2. ITSEC
  3. Common Criteria
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when you fill a known gap in physical security?

A

Compensating Control ( placing a guard at the gate entry)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NOT

A

Logical function that is true only when a single argument is false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RC5 key length.

A

up to 2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptology

A

The science that involves the use of codes and cyphers to obscure the meaning of a message.

17
Q

Cryptanalysis

A

The science of breaking cryptographic algorithms to obtain the secret message without authorization.

18
Q

Hash that produces a 160 bit digest.

A

SHA-1

19
Q

AES?
Types of algorithm
block or stream

A

Symmetric

128 bit Blocks

20
Q

AES block length.

A

128 bits

21
Q

NOR (not OR)

A

Logical function that is true only when both elements are false.

22
Q

Rijndael is what encryption?

A

AES

23
Q

Blowfish key length.

A

32 to 448 bits

24
Q

Four modes of DES encryption.

A

ECB, CBC, CFB, OFB

25
Q

how 3DES modes modes?

A

3

26
Q

Statistical

A

Uses a mathematical analysis of a message to break the cryptosystem.

27
Q

Mail encryption that uses 3DES, RSA, MD5, and X.509.

A

Privacy enhanced mail (PEM)

28
Q

Four modes of 3DES.

A

DES-EEE3, DES-EDE3, DES-EEE2, DES-EDE2

29
Q

AES key size and rounds?

A

128 bit - 10 rounds
192 bit - 12 rounds
256 bit - 14 rounds

30
Q

Cryptosystems

A

Sets of techniques that implement cryptography.

31
Q

What is the differant in a Code then a cipher?

A

A Code is a system the substitutes one word or phrase for another for secrecy or efficiency. Example the 10 code used by police (10-20).

32
Q

Hash that produces a 256 bit digest.

A

SHA-256

33
Q

XOR (exclusive OR)

A

Logical function that is true only when one of the elements is true and the other is false.

34
Q

Known plaintext attack

A

the attacker has access to the unencrypted message

35
Q

3DES?
Types of algorithm
rounds
key length

A

Symmetric
64- bit Blocks
48 rounds
key length 112 bits