Encryption Flashcards

1
Q

__________ is how information is concealed into a code so that the data is hidden and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The science of encrypting and encrypting information is called_________.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order for encryption to actually work it has to contain a variable, which in encryption is the key.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.

True
False

A

False: It can protect during trasmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This principle is ensuring sensitive information remains private unless given to another with explicit consent.

Authentication
Integrity
Confidentiality
Non repudiation

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used to verify the origin of the message.

Authentication
Integrity
Confidentiality
Non repudiation

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is used to prove the contents of a message have not been changed since it was sent.

Authentication
Integrity
Confidentiality
Non repudiation

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What prevents the sender from denying they sent an encrypted message?

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two different types of keys?

A

Symmetric, Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

True
False

A

False: Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main types of Symmetric algorithms?

Format: Algorithm1, Algorithm2

A

Block and Stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.

True
False

A

False: Produces a 64 bit key discarding every 8th bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What algorithm is the most widely used encryption standard in use today?

DES
Blowfish Algorithm
AES
None of the above

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?

Blowfish Algorithm
DES
AES
None of the above

A

Blowfish Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While MD5 is useful, it is not extremely robust or secure making it good for file verification but not good for things that need to be highly secured.

True
False

17
Q

Fill in the blank: MD5 hashes are _____ bits in length and show their _____ digit hexadecimal value equivalent.

18
Q

Which encryption method does NOT use a symmetric key?

AES
RSA
DES
Blowfish Algorithm

19
Q

What type of encryption uses both a private and a public key?

Asymmetric
Symmetric
DES
None of the above

A

Asymmetric

20
Q

SSL and TLS utilize what type/s of encryption?

A combination of asymmetric and symmetric encryption
Specialized key encryption
PKI Certificate Encryption
Mathematically comparable keys

A

A combination of asymmetric and symmetric encryption

21
Q

When used with wireless LAN, MD5 is vulnerable to password exposure?

True
False

22
Q

A message digest is encrypted the with sender’s private key, this digest is referred to as a digital signature. The receiver of this message can decrypt it using the receiver’s private key.

True
False

A

False: Receiver Public Key

23
Q

The cryptographic hash function is a 2-way function.

True
False

A

False: One-Way Function

24
Q

When visiting an HTTPS website, your browser establishes an ____________ encrypted connection.

A

Asymmetric

25
Q

Symmetric encryption consists of _____ key/s for encryption and decryption