Encrypting Data Flashcards

Security+

1
Q

What is the purpose of encrypting stored data?

A

To protect data on storage devices, including SSDs, hard drives, USB drives, and cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of encryption can protect data at rest?

A

Full-disk encryption (e.g., BitLocker, FileVault) and file encryption (e.g., EFS, third-party utilities).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is database encryption?

A

It protects stored data and the transmission of that data, often using transparent encryption and record-level encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does transparent encryption work?

A

It encrypts all database information using a symmetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is record-level encryption?

A

It encrypts individual columns in a database, using separate symmetric keys for each column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is transport encryption?

A

It protects data that is transmitted over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do browsers use transport encryption?

A

Browsers communicate securely using HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VPN and how does it encrypt data?

A

A VPN encrypts all data transmitted over the network, regardless of the application, using SSL/TLS or IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What factors determine the choice of an encryption algorithm?

A

Security level, speed, complexity of implementation, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of cryptographic keys in encryption?

A

The key determines the output of encrypted data, hash values, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is it important to keep your cryptographic key private?

A

It is the only thing protecting your encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does key length affect encryption security?

A

Larger keys are generally more secure and help prevent brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the common key length for symmetric encryption?

A

Commonly 128 bits or larger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What characterizes asymmetric encryption?

A

It uses complex calculations of prime numbers and typically requires larger key lengths, often 3,072 bits or more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is key stretching?

A

A process that strengthens a weak key by performing multiple hashing operations on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does key stretching enhance security against brute-force attacks?

A

It makes it much harder for attackers to reverse the hashes, requiring significantly more time and effort.