Test 3 - Review Questions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Can you undo a hash function?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are different types of ciphers?

A

Stream and Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Stream and Block ciphers?

A

Stream: One character at a time
Block: Group of characters at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Caesar Cipher?

A

The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is ‘shifted’ a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a block cipher used in the real world?

A

DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does AES stand for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does DES stand for?

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the piece of math used in AES/DES?

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is XOR?

A

(XOR) Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false). Represented with ^ (ie. P^Q)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is another way of saying, a XOR b?

Not on the test, just for understanding

A

a XOR b = (a OR b) AND (not a AND b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is RSA different from AES?

A
  1. RSA is related to prime numbers and factoring them

2. RSA is asymmetric, while AES is symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What result will you get for

Encode(public, pt)?

A

ct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What result will you get for

Encode(private, ct)?

A

pt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Let’s say Alice sends Bob a msg, how would Bob know it came from Alice?

A
  1. Bob generates Public(Bob), Private(Bob)
    1. Alice generates Public(Alice), Private(Alice)
  2. Bob tells everyone Public(Bob)
    1. Alice tells everyone Public(Alice).
  3. Alice Encode [Public(Bob), msg] to get ct
  4. Alice sends Bob cipher text
  5. Bob calculates encode [Private(Bob), ct] to set message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Let’s say Alice sends Bob a msg, and she encodes it. How would Bob decode it?

Alice
Encode(Public(Bob))
Encode(Private(Alice))

A
  1. Bob would Encode(Public(Alice))

2. Encode(Private(Bob), CT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Let’s say Alice sends Bob a msg, how would she generate it?

A
  1. Bob generates Public(Bob), Private(Bob)
  2. Bob tells everyone Public(Bob)
  3. Alice Encode [Public(Bob), msg) to get ct
  4. Alice sends Bob cipher text
  5. Bob calculates encode [Private(Bob), ct] to set message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is more expensive AES or RSA?

A

RSA, has more CPU cycles due to higher computations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When do we use encryption in our daily lives?

A
  1. E-Commerce, ie. using credit card numbers.

2. Check emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When you see a lock icon right before your URL on a browser, what web protocol is being applied?

A

SSL

20
Q

What is difference between authentication and authorization?

A

Authentication: Are you who you say you are? (ie. Username/PW)
Authorization: What level of access do you have?

21
Q

Are passwords stored in a database? If not, what is?

A

Passwords are not stored, hashed version of the passwords are stored.

22
Q

What is a hash comprised of?

A

Password + Salt

23
Q

What is salt?

A

Salt is random data that is used as an additional input to a one-way function that “hashes” data, a password or passphrase. Salts are used to safeguard passwords in storage. Can be based on various fields tied to an account (account, creation of account, time/date)

24
Q

If a person inputs their login credentials and hist send, what is happening in the background?

A
  1. A script looks up user, salt, hash password from database.
  2. Calculate hash(password+salt)
  3. Compare hashpassword and hash(password+salt).
25
Q

What types of malware is there?

A

Trojan horses, worms

26
Q

What do keyloggers do?

A

Stores all keys inputted (ie. passwords, credit card details).

27
Q

What languages do we use to build E-commerce websites and what do they do?

A
  1. HTML = Hypertext markup language = used for content, structure, webpage
  2. CSS = Cascading style sheet = styling
  3. JavaScript = interactive (user-side)
  4. PHP = Personal Homepage = dynamically create the webpages (server-side)
  5. SQL = database access
28
Q

What is the data hierarchy in a relational database?

A

Database
Table
Field

29
Q

An ethical approach that is based on duty and obligations is called _____:

A

deontology

30
Q

What are the 3 parts in a dialectic exchange?

A

Thesis, antithesis, synthesis

31
Q

What are is Kant’s 2nd categorical imperative?

A

“The second formulation of the categorical imperative is called the Formula of the End in Itself: “Act in such a way that you always treat humanity, whether in your own person or in the person of any other, never simply as a means, but always at the same time as an end.”

32
Q

What is consequentialism?

A

is the class of normative ethical theories holding that the consequences of one’s conduct are the ultimate basis for any judgment about the rightness or wrongness of that conduct. Thus, from a consequentialist standpoint, a morally right act (or omission from acting) is one that will produce a good outcome, or consequence.

33
Q

What is a database?

A

a structured set of data held in a computer, especially one that is accessible in various ways.

34
Q

Ask these questions when facing an ethical consequence

A
  1. Who are the stakeholders in this situation?
  2. What does each of them have to gain/lose?
  3. What duties and responsibilities are important?
  4. Can you think of an analogous situation? Does it clarify the situation?
  5. Make a decision or come to a dialectic exchange
35
Q

What are tables made up of?

A

Records

36
Q

What is stored in a table?

A

Each table contains RECORDS, which you enter into the database. All of your Clients, Images, Invoices, etc., are considered records (identified by an ID).

37
Q

What is stored in a record?

A

Within each record are data FIELDS. Fields are the individual parts that contain information about the record.

38
Q

What are records made up of?

A

Fields

39
Q

What are fields?

A

One point of data

40
Q

What is Syntax?

A

Grammar of a language

41
Q

Why is estimating a time scale for a project difficult? and how can this be accurately assessed?

A

It is difficult because there is no prior information to go on. You would need to break it down into smaller tasks and try them out.

42
Q

Does adding more people in a project resolve the problem faster?

A

Not always, it can potentially make it slower.

43
Q

What is a critical path when it comes to project management?

A

a critical path is the sequence of project network activities which add up to the longest overall duration, regardless if that longest duration has float or not. This determines the shortest time possible to complete the project. There can be ‘total float’ (unused time) within the critical path.

44
Q

What is a primary key?

A

Uniquely identifies a directory in a table.

45
Q

What is a foreign key?

A

Points to other records in other tables.

46
Q

What is Paramedic ethics?

A

Know a little and know when to ask