Fragen Flashcards

1
Q

Steps in main rounds of AES encryption?

A

Mix Columns
ShiftRows
AddRoundkey
Subbytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ requires operators of essentialservice to implement appropriate

___ adresses an important issue within EU

___ enhance cyber security

A

NIS2 - Network…
DCRA
EU legislative instruments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

requierements claudeshanan encryption procedures

A

-Diffusion
-Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST objective (CS framework)

A
  • Practices that are known to be effective are described in the NIST CS Framework
  • can help organization begin their…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES Algo for key length 128 bit contains how many rounds?

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA

A

Confidentialit
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Activities to take appropriate action…
Develeop and implementappropriate…
Collecting all assets as Data…
Development and implementation of…
Plans to maintain…

A

Respond
Protect
Identify
Detect
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True statements in regard of block ciphers

A
  • plaintext is broken up
  • Use operating models
  • AES, DES 3DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Doctor exchanges entry “allergic …”
Which security requirement is broken

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

key lengths of AES

A

192 bit
256 bit
128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream chipers true statements

A
  • Generate a pseudorandom
  • key not repeated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As a replacement for DES and 3DES

A
  1. NIST
  2. call for prop
  3. symmetric
  4. 128, 192, and 256 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

result in Diffusion

A

ShiftRows and MixColumns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST key function

A

Respond
protect
Identify
Detect
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymetric encryption method

A

computionally more intesive…

uses key pair. One key used…
uses key pair. Message encrypted…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hybrid encryption

A

utelizes public key of recepient to encrypt symmetric

utelizes symmetric key to encrypt clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

properties of hash functions

A

fast calculation
fixed length output
hard to gues input when hash is known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hashing functions

A
  • outputs value of fixed size
  • easy to calculate hash value of perimage M
19
Q

MAC “Message Authentication Code”

A
  • is calculated on basis…
  • small block of data
20
Q

Quantum technology

A

break key exchange

Quantum key distrib
Quantum key distrib

21
Q

The certificate is signed using the public key of certificate authority (True/false)

A

False

22
Q

Quantum computer

A

quantem phenomenon
shor algo
break key exchange

23
Q

The___standard is used to define info

the ____ is a field described…

A

X.509
Certificate Authority issuer name

24
Q

why do we need digital certificate?

A

to ensure public key belongs to a person, device org.

25
Q

biometric authentication

A
  • false match rate
  • false nonmatch rate
26
Q

Alice “read/write” “sales”-flag
DAC?

A

False

27
Q

[DAC, MAC, HMAC, CAC, BRAC, RBAC]
allows for users to modify…

A

DAC - ABAC - RBAC

28
Q

In DAC, the _ consists of identified subjects…
The Matrix can be decomposed, yielding _ that lists users and their permitted accessrights and

A
  • access control matrix
  • access control lists
  • capability tickets
29
Q

Key characteristic of RBAC

A

Access control is based on… role in system

30
Q

Characteristic of cloud computing

A
  • Resource pooling
  • On-demand self-service
  • Broad networks access
  • Rapid elasticity
31
Q

Social engineering

A
  • “Social engineering” relies on underlying…
  • Hacking humans
32
Q

what weekes is exploited by social engineering

A

the humans

33
Q

cloudsecurity - “NIST”

extend organizational practices

A

governance

34
Q

Which of the following documents is a good basis for assesment of concerns and issues connected to cloud.

A

NIST SP 800-144

35
Q

Communication protocols

A

SSH
IPSec
TLS

36
Q

Correct statements SSH

A

In the user authentication layer
SSH works over TCP connections
SSH works on the concept
SSH works over untrusted networks

37
Q

TLS statements

A
  • Applications connected connect with secure connection
  • TLS works on presentation/session layer
38
Q

___are used for communicatoins over untrusted networks
Both methods use___

A

IPSEC and TLS
encryption

39
Q

Example of use for IPSEC

A
  • Enhancinh electronic
  • Secure remote accesss
  • secure branch office connectivity
  • Establishing…
40
Q

characterises notion of DMZ in firewall

A

There is no direct connection…

41
Q

correct statement for stateful packet inspection firewall

A

A statefull inspection…
A stateful inspection…

42
Q

Logging information of routers, servers___
in this system events

A
  • SIEM
  • alarms raised according…
43
Q

Packetfilter osilayer

A

Transport layer, network layer

44
Q

SIEM characterisation

A

SIEM collects logging information…