Security P3 Flashcards

1
Q

What is encryption?

A

The process of converting data into an unreadable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is plain text?

A

Data before applying encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cipher text?

A

Data after applying encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of key encryption?

A

To ensure authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a public key?

A

A shared key used to encrypt data that is decrypted with its matching private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a private key?

A

A secret key used to decrypt data encrypted with its matching public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric encryption?

A

An encryption method using the same key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a disadvantage of symmetric encryption?

A

Key must be securely exchanged and once compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can symmetric encryption verify the origin of data?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is asymmetric encryption?

A

An encryption method using two keys: one public and one private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which key is used to encrypt a message in asymmetric encryption?

A

The public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which key is used to decrypt a message in asymmetric encryption?

A

The private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many keys are used in symmetric encryption?

A

1 key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many keys are used in asymmetric encryption?

A

2 keys: public and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the key shared in symmetric encryption?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the key shared in asymmetric encryption?

A

Only the public key

17
Q

Which is more secure: symmetric or asymmetric encryption?

A

Asymmetric

18
Q

Which is faster: symmetric or asymmetric encryption?

19
Q

Which uses shorter keys: symmetric or asymmetric encryption?

20
Q

What is confidentiality in data transmission?

A

Only the intended recipient can decrypt the message

21
Q

What is authenticity in data transmission?

A

Receiver must know who sent the message

22
Q

What is integrity in data transmission?

A

Message must not be altered during transmission

23
Q

What is non-repudiation in data transmission?

A

Neither party can deny involvement in the communication

24
Q

What is quantum cryptography?

A

An encryption method using quantum properties of photons for ultra-secure communication

25
What are the advantages of quantum cryptography?
More secure
26
What are the disadvantages of quantum cryptography?
Works only for short distances
27
What is the purpose of encryption protocols?
To secure internet communication by verifying identities and encrypting data
28
What is SSL/TLS?
Encryption protocols that secure communication between a client and server
29
What starts the SSL/TLS session?
A handshake between the client and server
30
What does the server send during SSL/TLS handshake?
Its digital certificate and public key
31
What does the client do after receiving the server certificate?
It verifies the server’s identity
32
What happens after identity verification in SSL/TLS?
An encryption algorithm is chosen and symmetric session keys are generated
33
What are some use cases of encryption protocols?
Transmitting passwords
34
What is a digital certificate?
A certificate issued by a Certificate Authority verifying the identity of an organization
35
How is a digital certificate issued?
Organization requests it
36
What is a digital signature?
A hashed message digest encrypted with the sender’s private key
37
How is a digital signature verified?
Receiver decrypts message and signature
38
What proves that a message was not tampered with?
Matching digests from hashing the original and decrypted message