Objective 4a Flashcards

1
Q

Process of attempting to verify or bind the identity of a user, system, or process

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four factors of authentication?

A

Knowledge, Possession, Biometric, Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Science of storing and transmitting data in a particular form so only those for whom it is intended can read and process it

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process of encoding information in such a way eavesdroppers cannot read the information

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ancient art of hiding information within other information

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The mathematics, such as number theory, and the application of formulas and algorithms underpinning both cryptography and cryptanalysis

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Study of cryptographic systems in order to understand how they work

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedures and protocols designed for cryptography are known as…?

A

Cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information cannot be read by anyone for who it

was not intended

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information cannot be altered in storage or transit between sender and intended receiver

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sender of the information cannot deny later that they never sent the information

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The sender and receiver can confirm each other’s identity as well as the information’s origin and intended destination

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of authentication is widely regarded as the hardest to forge or spoof

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most common authentication method on the internet and in computer world

A

Password Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictates how passwords in an organization will be structured

A

Password Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consist of amount of characters a password should have, combination of letters/numbers/special characters

A

Password Construction

17
Q

Identifies the policy on reusing passwords

A

Reuse Restrictions

18
Q

Minimum and maximum number of days a password can be used before it must be changed

A

Duration

19
Q

Developed to avoid problems associated with password reuse

A

One-Time Passwords

20
Q

What are the two types of one-time passwords?

A

Challenge-Response, One-Time Password List