IS3230 CHAPTER 13 Flashcards
The process of confirming the identity of a user is called ___.
AUTHENTICATION
An entity, usually a trusted third party, that issues digital certificates is called ___.
CERTIFICATE AUTHORITY (CA)
The certificate authorities list of invalid certificates is called ___.
CERTIFICATE REVOCATION LIST (CRL)
Applications or IT services delivered over the Internet rather than in a typical client/server model on a local area network is called ___.
CLOUD SERVICES
Ensuring that only the intended recipient can read the data is called ___.
CONFIDENTIALITY
The hardware or software system that transforms the clear text into cipher text is called ___.
CRYPTOSYSTEM
A protocol or an algorithm allowing two users to exchange a secret key over insecure communications is called ___.
DIFFIE-HELLMAN KEY EXCHANGE
This provides a stronger cryptographic result with a shorter key is called ___.
ELLIPTIC CURVE CRYPTOSYSTEM (ECC)
The process of applying an algorithm to clear-text (or plain-text) data, resulting in a cipher text is called ___.
ENCRYPTION
Ensuring the data has not been altered is called ___.
INTEGRITY
The range of values that construct a crypto system key is called ___.
KEYSPACE
The concept of ensuring an originator cannot refute the validity of a statement or document is called ___.
NON-REPUDIATION
A framework that consists of programs, procedures, and security policies that employs public key cryptography and the X.509 standard (digital certificates) is called ___.
PUBLIC KEY INFRASTRUCTURE (PKI)
An entity that is responsible for the registration and initial authentication of certificate subscribers is called ___.
REGISTRATION AUTHORITY (RA)
A public key crypto system based on factoring large numbers that are a product of two prime numbers is called ___.
RSA ASYMMETRIC ENCRYPTION ALGORITHM
- PKI is also know as public key encryption.
TRUE OR FALSE
FALSE
- Which of the following is an encryption key size length commonly used with public key algorithms?
- 127
- 255
- 1.023
- 2.048
2.048
- Which of the following are examples of symmetric algorithms? (Select two)
- RSA
- 3DES
- AES
- Diffle-Hellman
3DES
AES
- Which of the following are examples of asymmetric algorithms? (Select two)
- RSA
- 3DES
- AES
- Diffle-Hellman
RSA
Diffle-Hellman
- Asymmetric encryption is faster than symmetric encryption.
TRUE OR FALSE
FALSE
- A symmetric encryption algorithm provides which security services? (Select three)
- Confidentiality
- Identity
- Authentication
- Authorization
- Non-repudiation
Confidentiality
Identity
Authentication
- The RSA key length is ___.
1.024 bits
- Which of the following is the standard for certificates?
- X510
- Certificate authority
- X.509
- Certificate validation
Certificate authority
- Which of the following terms is the range of values that construct a crypto system key?
- Key length
- Key values
- Keyspace
- Key construction
Keyspace
- Digital signature provide which of the following? (Select two)
- Confidentiality
- Integrity
- Authentication
- Authorization
- Non-repudiation
Integrity
Non-repudiation