Fragen Flashcards

1
Q

Steps in main rounds of AES encryption?

A

Mix Columns
ShiftRows
AddRoundkey
Subbytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ requires operators of essentialservice to implement appropriate

___ adresses an important issue within EU

___ enhance cyber security

A

NIS2 - Network…
DCRA
EU legislative instruments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

requierements claudeshanan encryption procedures

A

-Diffusion
-Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST objective (CS framework)

A
  • Practices that are known to be effective are described in the NIST CS Framework
  • can help organization begin their…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES Algo for key length 128 bit contains how many rounds?

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA

A

Confidentialit
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Activities to take appropriate action…
Develeop and implementappropriate…
Collecting all assets as Data…
Development and implementation of…
Plans to maintain…

A

Respond
Protect
Identify
Detect
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True statements in regard of block ciphers

A
  • plaintext is broken up
  • Use operating models
  • AES, DES 3DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Doctor exchanges entry “allergic …”
Which security requirement is broken

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

key lengths of AES

A

192 bit
256 bit
128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream chipers true statements

A
  • Generate a pseudorandom
  • key not repeated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As a replacement for DES and 3DES

A
  1. NIST
  2. call for prop
  3. symmetric
  4. 128, 192, and 256 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

result in Diffusion

A

ShiftRows and MixColumns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST key function

A

Respond
protect
Identify
Detect
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymetric encryption method

A

computionally more intesive…

uses key pair. One key used…
uses key pair. Message encrypted…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hybrid encryption

A

utelizes public key of recepient to encrypt symmetric

utelizes symmetric key to encrypt clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

properties of hash functions

A

fast calculation
fixed length output
hard to gues input when hash is known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hashing functions

A
  • outputs value of fixed size
  • easy to calculate hash value of perimage M
19
Q

MAC “Message Authentication Code”

A
  • is calculated on basis…
  • small block of data
20
Q

Quantum technology

A

break key exchange

Quantum key distrib
Quantum key distrib

21
Q

The certificate is signed using the public key of certificate authority (True/false)

22
Q

Quantum computer

A

quantem phenomenon
shor algo
break key exchange

23
Q

The___standard is used to define info

the ____ is a field described…

A

X.509
Certificate Authority issuer name

24
Q

why do we need digital certificate?

A

to ensure public key belongs to a person, device org.

25
biometric authentication
* false match rate * false nonmatch rate
26
Alice "read/write" "sales"-flag DAC?
False
27
[DAC, MAC, HMAC, CAC, BRAC, RBAC] allows for users to modify...
DAC - ABAC - RBAC
28
In DAC, the _ consists of identified subjects... The Matrix can be decomposed, yielding _ that lists users and their permitted accessrights and
* access control matrix * access control lists * capability tickets
29
Key characteristic of RBAC
Access control is based on... role in system
30
Characteristic of cloud computing
* Resource pooling * On-demand self-service * Broad networks access * Rapid elasticity
31
Social engineering
* "Social engineering" relies on underlying... * Hacking humans
32
what weekes is exploited by social engineering
the humans
33
cloudsecurity - "NIST" extend organizational practices
governance
34
Which of the following documents is a good basis for assesment of concerns and issues connected to cloud.
NIST SP 800-144
35
Communication protocols
SSH IPSec TLS
36
Correct statements SSH
In the user **authentication layer**... SSH works over **TCP** connections SSH works on the **concept** SSH works over **untrusted networks**
37
TLS statements
* Applications connected connect with secure connection * TLS works on presentation/session layer
38
___are used for communicatoins over untrusted networks Both methods use___
IPSEC and TLS encryption
39
Example of use for IPSEC
* Enhancinh electronic * Secure remote accesss * secure branch office connectivity * Establishing...
40
characterises notion of DMZ in firewall
There is no direct connection...
41
correct statement for stateful packet inspection firewall
A statefull inspection... A stateful inspection...
42
Logging information of routers, servers___ in this system events
* SIEM * alarms raised according...
43
Packetfilter osilayer
Transport layer, network layer
44
SIEM characterisation
SIEM collects logging information...