IS3340 CHAPTER 4 Flashcards
An encryption algorithm adopted by the US government in 2002 as the standard for encryption operations and is called ___?
ADVANCED ENCRYPTION STANDARD (AES)
Cryptographic algorithm that uses two related keys – one key to encrypt data and another key to decrypt data and is called ___?
ASYMMETRIC ALGORITHM
A Window feature that encrypts entire volumes and normally uses a computer’s Trusted Platform Module (TPM) hardware to store encryption keys is called ___?
BITLOCKER
A Windows feature that encrypts removable media devices is called ___?
BITLOCKER TO GO
Any device, typically a CD, DVD, or USB key, from which a computer will boot and load an operating system is called ___?
BOOT DEVICE
A computer that stores digital certificates and issues them to authenticated subjects is called ___?
CERTIFICATE AUTHORITY
Algorithm for performing encryption and decryption is called ___?
CIPHER
Data that is stored on a persistent storage device, such as a disk drive is called ___?
DATA AT REST
Data that is currently being transported from one location to another, as in a transfer across a network connection is called ___?
DATA IN TRANSIT
The process of transforming previously encrypted information back into a readable format is called ___?
DECRYPTION
Another term for security certificate is called ___?
DIGITAL CERTIFICATE
A public key cryptographic algorithm based on the structure of elliptic curves and is called ___?
ELLIPTIC CURVE CRYPTOGRAPHY (ECC)
A Window feature that provides transparent file and folder encryption. Encryption keys in this are based on a user’s password ___?
ENCRYPTING FILE SYSTEM (EFS)
The process of transforming readable information into unreadable information in such a way that anyone with a proper key can reverse the process, making the information readable again is called ___?
ENCRYPTION
A device or software program to filter data passing through the device or program, limiting network traffic to authorized traffic only is called ___?
FIREWALL
A framework of open standards for protecting communications over Internet Protocol (IP) networks is called ___?
INTERNET PROTOCOL SECURITY (IPSec)
A piece of information that an encryption/decryption algorithm needs as input to transform a document is called ___?
KEY
A tunneling protocol used to support VPNs is called ___?
LAYER 2 TUNNELING PROTOCOL (L2TP)
This allows a sender to verify the source of a message and is called ___?
NONREPUDIATION
Unencrypted data, AKA clear text called ___?
PLAIN TEXT
A tunneling protocol used to support VPNs is called
POINT TO POINT TUNNELING PROTOCOL (PPTP)