J04: Encryption (PE) Flashcards

1
Q

__________ is how information is concealed into a code so that the data is hidden and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The science of encrypting and encrypting information is called_________.

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order for encryption to actually work it has to contain a variable, which in encryption is the key.

  • True
  • False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.

  • True
  • False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This principle is ensuring sensitive information remains private unless given to another with explicit consent.

  • Authentication
  • Integrity
  • Confidentiality
  • Non repudiation
A

Confidentiality ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used to verify the origin of the message.

  • Authentication
  • Integrity
  • Confidentiality
  • Non repudiation
A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is used to prove the contents of a message have not been changed since it was sent.

  • Authentication
  • Integrity
  • Confidentiality
  • Non repudiation
A

intergrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What prevents the sender from denying they sent an encrypted message?

A

non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two different types of keys?

A

symmetric & asymmetric ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

  • True
  • False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main types of Symmetric algorithms?

Format: Algorithm1, Algorithm2

A

block, steam ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.

  • True
  • False
A

False (ever 8th bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.

  • True
  • False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What algorithm is the most widely used encryption standard in use today?

  • DES
  • Blowfish Algorithm
  • AES
  • None of the above
A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?

  • Blowfish Algorithm
  • DES
  • AES
  • None of the above
A

Blowfish Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While MD5 is useful, it is not extremely robust or secure making it good for file verification but not good for things that need to be highly secured.

  • True
  • False
A

True

17
Q

Fill in the blank: MD5 hashes are _____ bits in length and show their _____ digit hexadecimal value equivalent.

A

128, 32

18
Q

Which encryption method does NOT use a symmetric key?

  • AES
  • RSA
  • DES
  • Blowfish Algorithm
A

RSA

19
Q

What type of encryption uses both a private and a public key?

  • Asymmetric
  • Symmetric
  • DES
    • None of the above
A

Asymmetric

20
Q

SSL and TLS utilize what type/s of encryption?

  • A combination of asymmetric and symmetric encryption
  • Specialized key encryption
  • PKI Certificate Encryption
  • Mathematically comparable keys
A

A combination of asymmetric and symmetric encryption

21
Q

When visiting an HTTPS website, your browser establishes an ____________ encrypted connection.

A

asymmetric

22
Q

When used with wireless LAN, MD5 is vulnerable to password exposure?

  • True
  • False
A

True

23
Q

A message digest is encrypted the with sender’s private key, this digest is referred to as a digital signature. The receiver of this message can decrypt it using the receiver’s private key.

  • True
  • False
A

False

24
Q

The cryptographic hash function is a 2-way function.

  • True
  • False
A

False

25
Q

Symmetric encryption consists of _____ key/s for encryption and decryption

A

1