IS3230 CHAPTER 13 Flashcards

1
Q

The process of confirming the identity of a user is called ___.

A

AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An entity, usually a trusted third party, that issues digital certificates is called ___.

A

CERTIFICATE AUTHORITY (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The certificate authorities list of invalid certificates is called ___.

A

CERTIFICATE REVOCATION LIST (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applications or IT services delivered over the Internet rather than in a typical client/server model on a local area network is called ___.

A

CLOUD SERVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensuring that only the intended recipient can read the data is called ___.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The hardware or software system that transforms the clear text into cipher text is called ___.

A

CRYPTOSYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A protocol or an algorithm allowing two users to exchange a secret key over insecure communications is called ___.

A

DIFFIE-HELLMAN KEY EXCHANGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This provides a stronger cryptographic result with a shorter key is called ___.

A

ELLIPTIC CURVE CRYPTOSYSTEM (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of applying an algorithm to clear-text (or plain-text) data, resulting in a cipher text is called ___.

A

ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ensuring the data has not been altered is called ___.

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The range of values that construct a crypto system key is called ___.

A

KEYSPACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The concept of ensuring an originator cannot refute the validity of a statement or document is called ___.

A

NON-REPUDIATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A framework that consists of programs, procedures, and security policies that employs public key cryptography and the X.509 standard (digital certificates) is called ___.

A

PUBLIC KEY INFRASTRUCTURE (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An entity that is responsible for the registration and initial authentication of certificate subscribers is called ___.

A

REGISTRATION AUTHORITY (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A public key crypto system based on factoring large numbers that are a product of two prime numbers is called ___.

A

RSA ASYMMETRIC ENCRYPTION ALGORITHM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. PKI is also know as public key encryption.

TRUE OR FALSE

A

FALSE

17
Q
  1. Which of the following is an encryption key size length commonly used with public key algorithms?
  2. 127
  3. 255
  4. 1.023
  5. 2.048
A

2.048

18
Q
  1. Which of the following are examples of symmetric algorithms? (Select two)
  2. RSA
  3. 3DES
  4. AES
  5. Diffle-Hellman
A

3DES

AES

19
Q
  1. Which of the following are examples of asymmetric algorithms? (Select two)
  2. RSA
  3. 3DES
  4. AES
  5. Diffle-Hellman
A

RSA

Diffle-Hellman

20
Q
  1. Asymmetric encryption is faster than symmetric encryption.
    TRUE OR FALSE
A

FALSE

21
Q
  1. A symmetric encryption algorithm provides which security services? (Select three)
  2. Confidentiality
  3. Identity
  4. Authentication
  5. Authorization
  6. Non-repudiation
A

Confidentiality
Identity
Authentication

22
Q
  1. The RSA key length is ___.
A

1.024 bits

23
Q
  1. Which of the following is the standard for certificates?
  2. X510
  3. Certificate authority
  4. X.509
  5. Certificate validation
A

Certificate authority

24
Q
  1. Which of the following terms is the range of values that construct a crypto system key?
  2. Key length
  3. Key values
  4. Keyspace
  5. Key construction
A

Keyspace

25
Q
  1. Digital signature provide which of the following? (Select two)
  2. Confidentiality
  3. Integrity
  4. Authentication
  5. Authorization
  6. Non-repudiation
A

Integrity

Non-repudiation