Encryption Flashcards

1
Q

__________ is how information is concealed into a code so that the data is hidden and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The science of encrypting and encrypting information is called_________.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order for encryption to actually work it has to contain a variable, which in encryption is the key.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.

True
False

A

False: It can protect during trasmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This principle is ensuring sensitive information remains private unless given to another with explicit consent.

Authentication
Integrity
Confidentiality
Non repudiation

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used to verify the origin of the message.

Authentication
Integrity
Confidentiality
Non repudiation

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is used to prove the contents of a message have not been changed since it was sent.

Authentication
Integrity
Confidentiality
Non repudiation

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What prevents the sender from denying they sent an encrypted message?

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two different types of keys?

A

Symmetric, Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.

True
False

A

False: Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main types of Symmetric algorithms?

Format: Algorithm1, Algorithm2

A

Block and Stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.

True
False

A

False: Produces a 64 bit key discarding every 8th bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What algorithm is the most widely used encryption standard in use today?

DES
Blowfish Algorithm
AES
None of the above

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?

Blowfish Algorithm
DES
AES
None of the above

A

Blowfish Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While MD5 is useful, it is not extremely robust or secure making it good for file verification but not good for things that need to be highly secured.

True
False

A

True

17
Q

Fill in the blank: MD5 hashes are _____ bits in length and show their _____ digit hexadecimal value equivalent.

A

128, 32

18
Q

Which encryption method does NOT use a symmetric key?

AES
RSA
DES
Blowfish Algorithm

A

RSA

19
Q

What type of encryption uses both a private and a public key?

Asymmetric
Symmetric
DES
None of the above

A

Asymmetric

20
Q

SSL and TLS utilize what type/s of encryption?

A combination of asymmetric and symmetric encryption
Specialized key encryption
PKI Certificate Encryption
Mathematically comparable keys

A

A combination of asymmetric and symmetric encryption

21
Q

When used with wireless LAN, MD5 is vulnerable to password exposure?

True
False

A

True

22
Q

A message digest is encrypted the with sender’s private key, this digest is referred to as a digital signature. The receiver of this message can decrypt it using the receiver’s private key.

True
False

A

False: Receiver Public Key

23
Q

The cryptographic hash function is a 2-way function.

True
False

A

False: One-Way Function

24
Q

When visiting an HTTPS website, your browser establishes an ____________ encrypted connection.

A

Asymmetric

25
Q

Symmetric encryption consists of _____ key/s for encryption and decryption

A

One