IS3230 CHAPTER 13 Flashcards

1
Q

The process of confirming the identity of a user is called ___.

A

AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An entity, usually a trusted third party, that issues digital certificates is called ___.

A

CERTIFICATE AUTHORITY (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The certificate authorities list of invalid certificates is called ___.

A

CERTIFICATE REVOCATION LIST (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applications or IT services delivered over the Internet rather than in a typical client/server model on a local area network is called ___.

A

CLOUD SERVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensuring that only the intended recipient can read the data is called ___.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The hardware or software system that transforms the clear text into cipher text is called ___.

A

CRYPTOSYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A protocol or an algorithm allowing two users to exchange a secret key over insecure communications is called ___.

A

DIFFIE-HELLMAN KEY EXCHANGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This provides a stronger cryptographic result with a shorter key is called ___.

A

ELLIPTIC CURVE CRYPTOSYSTEM (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of applying an algorithm to clear-text (or plain-text) data, resulting in a cipher text is called ___.

A

ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ensuring the data has not been altered is called ___.

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The range of values that construct a crypto system key is called ___.

A

KEYSPACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The concept of ensuring an originator cannot refute the validity of a statement or document is called ___.

A

NON-REPUDIATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A framework that consists of programs, procedures, and security policies that employs public key cryptography and the X.509 standard (digital certificates) is called ___.

A

PUBLIC KEY INFRASTRUCTURE (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An entity that is responsible for the registration and initial authentication of certificate subscribers is called ___.

A

REGISTRATION AUTHORITY (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A public key crypto system based on factoring large numbers that are a product of two prime numbers is called ___.

A

RSA ASYMMETRIC ENCRYPTION ALGORITHM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. PKI is also know as public key encryption.

TRUE OR FALSE

17
Q
  1. Which of the following is an encryption key size length commonly used with public key algorithms?
  2. 127
  3. 255
  4. 1.023
  5. 2.048
18
Q
  1. Which of the following are examples of symmetric algorithms? (Select two)
  2. RSA
  3. 3DES
  4. AES
  5. Diffle-Hellman
19
Q
  1. Which of the following are examples of asymmetric algorithms? (Select two)
  2. RSA
  3. 3DES
  4. AES
  5. Diffle-Hellman
A

RSA

Diffle-Hellman

20
Q
  1. Asymmetric encryption is faster than symmetric encryption.
    TRUE OR FALSE
21
Q
  1. A symmetric encryption algorithm provides which security services? (Select three)
  2. Confidentiality
  3. Identity
  4. Authentication
  5. Authorization
  6. Non-repudiation
A

Confidentiality
Identity
Authentication

22
Q
  1. The RSA key length is ___.
A

1.024 bits

23
Q
  1. Which of the following is the standard for certificates?
  2. X510
  3. Certificate authority
  4. X.509
  5. Certificate validation
A

Certificate authority

24
Q
  1. Which of the following terms is the range of values that construct a crypto system key?
  2. Key length
  3. Key values
  4. Keyspace
  5. Key construction
25
10. Digital signature provide which of the following? (Select two) 1. Confidentiality 2. Integrity 3. Authentication 4. Authorization 5. Non-repudiation
Integrity | Non-repudiation