IA 2 - CISCO 4 Flashcards

1
Q
  • science of making and breaking secret codes.
  • a way to store and transmit data so only the intended recipient can read or process it.
  • Modern ——– uses computationally secure algorithms to make sure that cyber criminals cannot easily compromise protected information.
A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

process of scrambling data so that an unauthorized party cannot easily read it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When enabling encryption, readable data is

A

cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

over the centuries, various cipher methods, physical devices, and aids encrypted and decrypted text

A
  1. scytale
  2. caesar cipher
  3. vigenere cipher
  4. enigma machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

while the encrypted version is

A

encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

– letters are rearranged

A

transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Each encryption method uses a specific algorithm, called

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

there are several methods of creating ciphertext:

A
  1. Transposition
  2. Substitution
  3. One-time pad
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– letters are replaced

A

Substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two Types of Encryption

A
  1. symmetric algorithm
  2. asymmetric algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext

A

One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  • Both the sender and receiver know the pre-shared key before any encrypted communication begins.
  • algorithms use the same pre-shared key to encrypt and decrypt data, a method also known as private-key encryption.
A

Symmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.

A

Asymmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most common types of cryptography are

A
  1. block cipher
  2. stream cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • transform a fixed-length block of plaintext into a common block of ciphertext of 64 or 128 bits.
  • usually result in output data that is larger than the input data, because the ciphertext must be a multiple of the block size.
A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • encrypt plaintext one byte or one bit at a time
  • the transformation of these smaller plaintext units varies, depending on when they are encountered during the encryption process.
  • faster than block ciphers, and generally do not increase the message size, because they can encrypt an arbitrary number of bits.
A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some of the common encryption standards that use symmetric encryption include the following

A
  1. 3DES
  2. IDEA
  3. AES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
A

3DES - Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The 3DES encryption cycle is as follows:

A
  1. Data encrypted by first DES
  2. Data decrypted by second DES
  3. Data re-encrypted by third DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

performs eight rounds of transformations on each of the 16 blocks that results from dividing each 64-bit block.

A

IDEA - International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • fixed block size of 128-bits with a key size of 128, 192, or 256 bits.
  • strong algorithm that uses longer key lengths.
A

AES - Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

also called public-key encryption, uses one key for encryption that is different from the key used for decryption

A

Asymmetrical Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The asymmetric algorithms include:

A
  1. RSA
  2. Diffie-Hellman
  3. ElGamal
  4. Elliptic Curve Cryptography (ECC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • uses the product of two very large prime numbers with an equal length of between 100 and 200 digits.
  • Browsers use this to establish a secure connection.
A

RSA (Rivest-Shamir-Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • provides an electronic exchange method to share the secret key. Secure protocols, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Secure Shell (SSH), and Internet Protocol Security (IPsec), use this.
A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • uses the U.S. government standard for digital signatures.
  • This algorithm is free for use because no one holds the patent.
A

ElGamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

includes the generation, exchange, storage, use, and replacement of keys used in an encryption algorithm.

A

Key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

uses elliptic curves as part of the algorithm. In the U.S., the National Security Agency uses ECC for digital signature generation and key exchange.

A

Elliptic Curve Cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Two terms used to describe keys are:

A
  1. key length
  2. keyspace
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

his is the number of possibilities that a specific key length can generate.

A

keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Also called the key size, this is the measure in bits.

A

key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Four protocols use asymmetric key algorithms

A
  1. Internet Key Exchange
  2. SSL
  3. SSH
  4. Pretty Good Privacy
27
Q

which is a means of implementing cryptography into a web browser.

A

Secure Socket Layer (SSL)

27
Q

which is a computer program that provides cryptographic privacy and authentication to increase the security of email communications.

A

Pretty Good Privacy (PGP)

27
Q

which is a protocol that provides a secure remote access connection to network devices.

A

Secure Shell (SSH)

28
Q

which is a fundamental component of IPsec Virtual Private Networks (VPNs).

A

Internet Key Exchange (IKE)

29
Q

are actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.

A

Physical Access Controls

30
Q

Examples of physical access controls

A
  1. fences
  2. guard dogs
  3. laptop locks
  4. security cameras
  5. swipe cards
31
Q
  • are the hardware and software solutions used to manage access to resources and systems.
  • These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
A

LOGICAL ACCESS CONTROL

32
Q

logical access controls include the following:

A
  1. encryption
  2. smart card
  3. password
  4. biometrics
  5. ACL
  6. protocol
  7. router
  8. ids
  9. firewall
  10. clipping levels
33
Q
  • are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
  • focus on personnel and business practices
A

administrative access control

34
Q

Administrative controls include the following

A
  1. policies
  2. procedures
  3. hiring practices
  4. background checks
  5. data classification
  6. security training
  7. reviews
35
Q
  • restricts the actions that a subject can perform on an object.
  • A subject can be a user or a process.
  • An object can be a file, a port, or an input/output device.
  • An authorization rule enforces whether or not a subject can access the object.
  • restricts a subject based on the security classification of the object and the label attached to the user.
A

Mandatory Access Control

36
Q
  • rants or restricts object access determined by the object’s owner.
  • As the name implies, controls are discretionary because an object owner with certain access permissions can pass on those permissions to another subject.
  • An object’s owner determines whether to allow access to an object
A

discretionary access control (DAC)

37
Q
  • depends on the role of the subject.
  • Roles are job functions within an organization.
  • Specific roles require permissions to perform certain operations.
  • Users acquire permissions through their role.
A

Role-based access control (RBAC)

38
Q
  • help determine whether to grant access.
  • A series of rules is contained in the ACL, as shown in the figure.
  • The determination of whether to grant access depends on these rules.
A

Rule-Based Access Control

39
Q
  • enforces the rules established by the authorization policy.
  • A subject requests access to a system resource.
  • Every time the subject requests access to a resource, the access controls determine whether to grant or deny access.
A

Identification

40
Q

examples of something that the user knows.

A
  1. passwords
  2. pins
  3. pass phrases
41
Q

examples of something that users have in their possession.

A
  1. smart card
  2. security key fob
42
Q

a small plastic card, about the size of a credit card, with a small chip embedded in it

A

smart card

43
Q

a device that is small enough to attach to a key ring. It uses a process called two-factor authentication,

A

security key fob

44
Q

A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user

A

biometrics

45
Q

include patterns of behavior, such as gestures, voice, typing rhythm, or the way a user walks

A

behavioral characteristics

45
Q

There are two types of biometric identifiers

A
  1. physiological characteristics
  2. behavioral characteristics
46
Q

these include fingerprints, DNA, face, hands, retina, or ear features

A

physiological characteristics

47
Q
  • uses at least two methods of verification.
  • can reduce the incidence of online identity theft because knowing the password would not give cyber criminals access to user information.
A

Multi-factor Authentication

48
Q

controls what a user can and cannot do on the network after successful authentication.

A

authorization

48
Q

stop unwanted or unauthorized activity from happening.

A

Preventive access controls

49
Q

As shown in the figure, authorization answers the question

A
  1. read
  2. copy
  3. create
  4. delete
50
Q

traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.

A

Accountability

51
Q
  • opposite of a reward
A

Deterrent Controls

52
Q
  • provide options to other controls to bolster enforcement in support of a security policy.
  • an also be a substitution used in place of a control that is not possible under the circumstances.
A

Compensative Controls

52
Q

act or process of noticing or discovering something. Access control detections identify different types of unauthorized activity.

A

detective controls

53
Q
  • can repair damage, in addition to stopping any further damage.
  • These controls have more advanced capabilities over corrective access controls.
A

Recovery Controls

53
Q
  • counteracts something that is undesirable.
  • Organizations put corrective access controls in place after a system experiences a threat.
  • restore the system back to a state of confidentiality, integrity, and availability.
A

Corrective Controls

54
Q

replaces data with authentic looking values to apply anonymity to the data records.

A

Substitution

54
Q
  • technology secures data by replacing sensitive information with a non-sensitive version
  • can replace sensitive data in non-production environments to protect the underlying information.
A

data masking

55
Q

Data Masking Techniques

A
  1. substituion
  2. shuffling
  3. nulling
56
Q

out applies a null value to a particular field, which completely prevents visibility of the data.

A

Nulling

56
Q
  • derives a substitution set from the same column of data that a user wants to mask.
  • This technique works well for financial information in a test database, for example.
A

Shuffling

57
Q

conceals data (the message) in another file such as a graphic, audio, or other text file.

A

Steganography

57
Q

There are several components involved in hiding data.

A
  1. embedded text
  2. cover text
  3. stego key
58
Q

hides information in plain sight by creating a message that can be read a certain way by some to get the message

A

Social Steganography

59
Q
  • protects software from unauthorized access or modification
  • inserts a secret message into the program as proof of ownership.
  • The secret message is the software watermark. If someone tries to remove the watermark, the result is nonfunctional code.
A

Software watermarking

59
Q
  • The approach used to embed data in a cover-image is using
  • uses bits of each pixel in the image.
A

Least Significant Bits (LSB)

60
Q
  • is the discovery that hidden information exists.
  • The goal of this is to discover the hidden information.
A

steganalysis

61
Q
  • is the use and practice of data masking and steganography techniques in the cybersecurity and cyber intelligence profession.
  • is the art of making the message confusing, ambiguous, or harder to understand.
  • A system may purposely scramble messages to prevent unauthorized access to sensitive information.
A

Data obfuscation

62
Q
  • translates software into a version equivalent to the original but one that is harder for attackers to analyze.
  • Trying to reverse engineer the software gives unintelligible results from software that still functions.
A

Software obfuscation