Learning: 6.6 Explain common uses of encryption. Flashcards

1
Q

What option on iOS protects email and other apps’ data at-rest by using encryption?

A

The “Data Protection” option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of encryption is used by mobile applications to encrypt data in-transit?

A

Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) is an implementation of asymmetric encryption used by mobile applications for encrypting data in-transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What password length is acceptable for an ordinary user account?

A

Nine to twelve characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of password attack involves comparing encrypted passwords against a predetermined list of possible password values?

A

A dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can an administrator help make sure that a stolen password cannot be misused indefinitely?

A

Configuring a password expiration period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which scenario is an example a stealing a password via a brute-force attack?

A

An attacker uses password-cracking software to attempt every possible alphanumeric password combination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a weakness of password managers?

A

A user must trust that the application storing the passwords is secure and cannot be cracked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly