Encryption and hashing Flashcards

1
Q

What is the use of encryption?

A

Making sensitive data hard to read by attackers and unauthorized individuals
decryption needs a secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of encryption?

A

Symmetric and asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hashing?

A

using an algorithm to convert plain text to unique fixed-length hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What way can hackers hack a hashed password?

A

using brute force attack, trying to write all possible passwords until they find the correct one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What key does symmetric encryption use?

A

Uses the same key to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what key does asymmetric encryption use?

A

uses a pair of public and private keys, the key used to encrypt data cant be used to decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is asymmetric encryption best used?

A

accessing sites using HTTPS and electronic data signing solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of encryption of data in transit?

A

HTTPS protects data being sent over a network
Protecting in transit protects from outside observers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you encrypt data in use?

A

Using RAM or CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly