Domain 2 Flashcards

(254 cards)

1
Q

What captures the relationships between physical and logical assets

A

Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

are the minimum level of security required for the system or application

A

Baseline Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

reduce error and provides a clear communication standard

A

Standard Naming Conventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advanced planning is needed to apply deviations from an organization’s IP addressing schema

A

Internet protocol (IP) schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to regulations pertaining to data being stored in other countries

A

Data sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the practice of enacting security controls that protect the CIA (Confidentiality, Integrity, Availability) of data

A

Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the systems way to prevent unwanted sensitive data from leaving the organization’s network

A

Data loss prevention (DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of hiding data by redacting all or parts of its content to preserve its confidentiality

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data, whether at rest, in motion, or in processing requires encryption

A

Data At rest/ In transit/motion/ In processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the process of replacing data fields with random values

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What refers to the practice of protecting the rights of users over digital objects

A

Rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The lack of physical borders in the online world makes rights management difficult to govern

A

Geographical considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Policies such as a BCP (Business Continuity Plan) or DRP (Disaster Recovery Plan) that are created to promote business resiliency

A

Response and recovery controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security feature that prevents attackers from bypassing security through encrypted channels

A

Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A mathematical function that creates a fixed-length output from a variable-length input, used to verify the integrity of data

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security controls should be in place to authenticate users and not allow for unwanted access

A

API Considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is an alternative site that has little to no backups of the original site’s data and is fully operational within weeks

A

Cold Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is an alternative site that has full backups of the original site’s data and is fully operational within minutes to a few hours

A

Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is an alternative site that partial backups of the original site’s data and is fully operational within a few days

A

Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are computer systems with fake data that is designed to attract hackers

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

are computer files that are designed resemble legitimate files but contain fake data

A

Honeyfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network designed as a decoy to attract hackers

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

refers to fake network traffic that is designed to mimic real network communication

A

Fake Telemtry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

occurs when a user is redirected to a malicious or wrong URL

A

DNS Sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A cloud computing model to provision cloud-based IT resources and components
Infrastructure as a service (IaaS
26
A cloud computing model to provision cloud-based IT services such as database management
Platform as a service (PaaS)
27
A cloud computing model to provision cloud-based software directly to a user over the internet
Software as a service (SaaS
28
The provisioning of ad hoc services via a cloud service
Anything as a service (XaaS)
29
refers to a cloud environment that is accessible by multiple organization
Community Cloud
30
cloud refers to a cloud environment that is only accessible by a single organization
Private
31
What cloud refers to a cloud environment that is a mix of both public and private cloud environments
Hybrid Cloud
32
A company that manages the IT infrastructure and security services of an organization
Managed service provider (MSP)/managed security service provider (MSSP
33
refers to a distributed cloud architecture that reduces latency
Fog computing
34
refers to a cloud architecture that performs computing at the edge of a network
Edge Computing
35
is a lightweight computer with limited capabilities and resources
Thin cilent
36
are environments that packages code to be executed software within an isolated and standard environment
Containers
37
collection of small modules that work together to create a complete system
Microservices/APIA
38
The act of provisioning IT systems and applications from machine-readable files and code
Infrastructure as code
39
A network architecture to manage compatible IT networking devices through computer programming
Software-defined networking (SDN)
40
Real-time reporting of configuration data through application programmable interfaces (APIs
Software-defined visibility (SDV)
41
An organization owns and manages web applications and rents its usage to users, usually on a subscription model
Serverless architecture
42
The process of enabling separate processes and services to work together
Services integration
43
define how resources are provisioned along with its restrictions
Resource policies
44
allows for a network connection to a Virtual Private Cloud network
transit gateway
45
is the technology that allows a computer to have multiple operating systems installed
Virtualization
46
A set of management practices and policies to keep track of **** within the enterprise. To make sure they can be controlled.
Virtual machine (VM) sprawl avoidance
47
Pre-programmed security controls that prevents a virtual machine from escaping its hypervisor and infecting the host operating system
VM escape protection
48
Computing ****** are isolated areas that provide the functionalities required for software development, testing, staging, and production
Environment
49
A ********** environment is an isolated computing environment designed for software development
Development
50
The **** environment is an isolated computing environment that resembles the production environment but is designed for software testing and troubleshooting
Test
51
is an isolated computing environment where tested software is prepared for the production environment
Staging
52
What is the process of ensuring manufactured components are clear of defects prior to its integration
Quality Assurance
53
_______ is the process of assigning permission to users. ________ is removing the users’ permissions.
Provisioning/Deprovisioning
54
The process to determine if unauthorized changes have been made to data.
Integrity measurement
55
Is the process of removing unwanted characters from a string input prior to its processing
Normalization
56
are pre-compiled functions to query a database
Stored procedures
57
this the practice of writing code that is difficult to analyze by observing its source code
Obfuscation/Camouflage
58
is code that when executed, its results are not used elsewhere within the application
Dead weight
59
Applications can perform input validation and code execution locally or on a remote server
Server-side vs. client-side execution and validation
60
Is the process of allocating memory to applications to avoid a memory leak
Memory Management
61
Software developers use SDKs to create software within a pre-built programming environment
Use of third-party libraries and software development kits (SDKs
62
occurs when the application loses control of its data during operations
Data Exposure
63
OWASP is a nonprofit organization dedicated to the protection of web-based applications
Open Web Application Security Project (OWASP
64
The process of having different components for software features and capabilities
Software diversity
65
converts programming languages to binary language
Complier
66
diversity is the act of creating identical binary images with different specifications
Binary
67
The process of automating tasks and courses of actions to prevent, detect, and recover from security incidents
Automation/scripting Automated courses of action
68
The process of constantly detecting and evaluating the risks associated with software systems
Continuous monitoring
69
The process of constantly detecting and evaluating security baseline changes to software systems
Continuous Validation
70
A technique to detect and resolve code conflicts by reducing interaction errors
Continuous integration
71
is a technique to deploy changes quickly and sustainably to software systems
Continuous delivery
72
is a technique to automatically release new software versions for immediate availability
Continuous deployment
73
refers to a system’s ability to withstand changes without issue
Elasticity
74
refers to a systems’ ability to increase its workload capacity with its current resources
Scalability
75
is the process of tracking the changes to different versions of software
Version Control
76
is the process of verifying an identity previously established in a computer system
Authentication
77
allows centralized security management and provides a logical means of organizing resources (users, printers, etc. data storage mechanism similar to database
Directory Services
78
A collection of autonomous computer networks that agree on a common set of operating standards, identities can access resources on diverse networks
Federation
79
What is the supplying of proof or evidence of some fact, Used to verify the trustworthiness of a system
Attestation
80
An authentication technology that uses a time-based fact to create unique password
Time-based one-time password (TOTP)
81
An authentication technology that’s based on the ____ algorithm
HMAC-based one-time password (HOTP)
82
An authentication technology that’s based on sending text messages
Short message service (SMS)
83
is a small piece of hardware that is used to identify and authenticate a user, Tokens can be virtual and contains, the user’s rights and access privileges
Token Key
84
The password/cryptographic key remains on the Usually would require an additional factor such as a PIN or password
Static Code
85
allow the user to initiate a logon and the application generates a response that the user enters intothe system
Authentication Applications
86
sends the user authentication notifications or access codes directly to the user’s mobile device
Push Notifications
87
can be used to verify that the user is in possession of the actual mobile device
Phone Call
88
carry long cryptographic tokens that are too large to guess
Smart Card Authentications
89
factors are biological factors specific to an individual
Biometrics
90
is the measurement of the pattern expressed by a person as they walk
Gait Analysis
91
For biometrics to be effective, they must have both low false positive rates and low false negative rates
Efficacy Rates
92
determines what level of false positives is allowed in the system
False Acceptance
93
determines what level of false negatives, or rejections, are going to be allowed in the system
False Rejections
94
(CER) is where both accept and reject error rates are equal, This is the desired state for the most efficient operation
Crossover error rate
95
What Attributes are collections of artifacts that focus on elements associated with the user
Multifactor authentication attributes
96
Something you ….., refers to presenting a trigger and measuring a response that cannot be fakedAn example is the results of a lie detector test
Something you exhibit
97
verifies the identity of the subject by comparing one or more factors against a database of valid identities (e.g., user accounts
Authentication
98
indicates who is trusted to perform specific operations For example, administrators grant a user access to files based on the user’s proven identity
Authorization
99
provides accountability by ensuring that subjects can be held accountable for their actions
Auditing
100
includes auditing, logging, and monitoring
Accounting
101
Determination of authentication processes should rest on data criticality and who needs access
Cloud vs. on-premises requirements
102
What is the use of multiple, independent elements to perform a critical function
Redundancy
103
number of third-party companies offer high-speed connections for storing data in a separate facility, Depending on the level of security desired, the storage facility could be reinforced against possible threats in the area (such as tornados or floods
Geographic dispersal
104
Disks are the primary storage mechanism in a system, whether composed of physical hard drives with spinning platters or solid-state memory devices can increase the speed of data recovery as multiple drives can retrieve data at the same time
Redundant array of inexpensive disks (RAID 0)
105
What splits data across all the drives with no redundancy offered
Redundant array of inexpensive disks (RAID) Level 0 (striped disks)
106
What copies the data from one disk onto two or more disks If any one disk is lost, the data is not lost since it is also copied onto the other disks
Redundant array of inexpensive disks (RAID) Level 1 (mirrored disks)
107
What is designed to be able to recover the loss of any single disk using error-correcting technique
Redundant array of inexpensive disks (RAID) Level 2 (bit-level error-correcting code
108
What spreads the data across multiple disks at the byte level with one disk dedicated to parity bits
Redundant array of inexpensive disks (RAID) Level 3 (byte-striped with error check)
109
What stripes data across several disks but in larger stripes than in RAID 3, and it uses a single drive for parity-based error checking
Redundant array of inexpensive disks (RAID) Level 4 (dedicated parity drive)
110
What stripes the data at the block level and spreads the parity data across the drives, is the most common method used
Redundant array of inexpensive disks (RAID) Level 5 (block-striped with error check)
111
provides redundancy in the event of a problem with a network adapter
Multipath
112
is the infrastructure that connects IT components
Network
113
What move loads across a set of resources in an effort not to overload individual servers
Load balancers
114
teaming groups multiple NICs together This provides for load balancing and fault tolerance
Network interface card (NIC) teaming
115
What are power supply systems that can function using a temporary battery backup in the event of a power failure
Uninterruptible power supply (UPS
116
A ____ _______ is a system where two independent power supply units, either capable of handling the load, are used
Dual Supply
117
PDU) is a device designed to handle the electrical power for server racks
Power Distribution Unit
118
What is a dedicated network that connects compute elements to storage elements
Storage Area Network (SAN)
119
What technologies can enable replication of processing units that can be manipulated between different computers
Virtual Machine (VM)
120
Location is an important consideration when determining redundant storage locations
On Premise Vs Cloud
121
What backup are all files and software are copied onto the storage media?
Full
122
Backs up files that have changed since the last full or _____ backup occurred, Requires fewer files to be backed up
Incremental
123
A _______ is a copy of a virtual machine at a specific point in time, a ____\ is created by copying the files that store the virtual machine
Snapshot
124
Backs up files that have changed since the last full backup
Differential
125
_____ drives are an older form of data storage mechanism, and they are characterized by their sequential read/write access. For bulk storage of backups, ____ is still a viable alternative in terms of cost and performance.
Tape
126
The term _____ refers to either a physical hard drive with spinning platters or a solid-state memory deviceBacking up a ____ is a common operation for a single computer.
Disk
127
What is the simplest form of backup for a file or set of files. One of the advantages of having users make copies of critical documents is the ability to do a quick restore in the event of an overwrite error.
Copy
128
What is the use of a network connection to attach external storage to a machine
Network attached storage (NAS)
129
What storage can increase security concerns because someone else is protecting the data
Cloud
130
What backup is a specific structure of the backup file to match that of the system being backed up
Image based
131
______ backups have the advantage of providing geographic separation of the backups from the original system, ____ backups are those stored on an offline system that is not accessible via the Internet
Online/Offline
132
Backups that are ones stored in a location separate from the system being backed up
Offsite Storage
133
What is also critical when examining the reach of a disaster, It is important that the offsite location is far enough away that it is not affected by the same incident.
Distance Considerations
134
refers to system items that are not permanent and can change
Non-persistence
135
A system’s ability to recover to a pre-incident state
Revert to known state
136
A system’s ability to recover to a known state in the event of a boot failure
Last known-good configuration
137
A bootable flash drive or DVD source that contains a complete bootable image of the OS
Live Boot Media
138
The ability to maintain the availability of data and operational processing despite a disrupting event
high availability
139
enables a system to accommodate larger workloads
Scalability
140
The most important data needs to be identified and then backed up in a manner that facilitates its quick restore
Restoration Order
141
Having ______ in technologies, vendors, processes, and controls can assist in resiliency through differences in failure modes
Diversity
142
Having a diverse set of these elements improves the chances of catching an attacker, even when they can beat one or two control elements
Technologies
143
Having diversity in the vendors used for security prevents vendor-specific forms of single points of failure and creates a more robust set of defensive capabilities
Vendors
144
to work, both sides must agree on algorithms, keys, and other parameters, Diversity can still exist in this environment
Cryptographic solutions
145
Multiple layers of different security controls lower your attack surface and increase your defense-in-depth
Controls
146
are computers that are included as part of a larger system Printers, SMART TVs, and automobiles have embedded systems
Embedded Systems
147
________ is a low-cost (less than $50), single-board computer
Raspberry Pi
148
What are electronic circuits that are programmed to perform a specific function
Field-programmable gate array (FPGA)
149
is a single-board microcontroller, not a full-fledged computer like the Raspberry pi
Arduino
150
What is the system that is designed to control automated systems in cyber-physical environments
Supervisory control and data acquisition (SCADA)/industrial control system (ICS)SCADA/ICS system
151
SCADA systems find many uses in facilities, ranging from the building automation systems of the HVAC system, to pumps for water pressure, escalators and elevators, and fire alarms
Facilities
152
Facilities that may include a fire alarm, surveillance, and HVAC system, depending on the requirements of the facility
Industrial
153
Industrial facilities may include SCADA and PLC (programmable logic controllers) systems
Manufacturing
154
systems include chemical, solar, and nuclear facilitiesLike manufacturing, energy systems may include SCADA
Energy
155
What systems may include surveillance and geolocation, depending on the requirements of the facility It can involve sea, surface (roads and rail), and air transport
Logistics
156
refers to a device that connect directly via the Internet for a specific function
Internet of Things (IoT)
157
is the transmission of voice communications over IP networks
VoIP(Voice Over IP)
158
are climate control systems that are managed by embedded systems
HVAC systems
159
combine the functionalities of a printer, scanner, and fax machine, with full network connectivity
Multi Function Printers (MFP)
160
Real-time operating systems are designed for devices where the processing must occur in real time
operating system
161
These are used in enterprises such as news organizations, which rely on getting the data live without extra processing delays
Surveillance Systems
162
refers to a complete computer system miniaturized on a single integrated circuit Designed to provide the full functionality of a computing platform on a single chip
System on a chip (SoC)
163
communications use narrow bands of frequencies for low-data-rate communications This type of radio offers advantages in range and power utilization
Narrow-band radio
164
refers to the signal that is being transmitted and represents a single channel of communication
Baseband Radio
165
A ____ card provides a means of identifying users and other key items of information when using telecommunication networks
Subscriber identity module (SIM) cards
166
is a low-power mesh radio service used to connect sensors and basic devices
Zigbee
167
When the ____ supply is interrupted and no backup ____ supply exists, the device stops functioning ______ drives many design elements because extra functionality that is not needed uses ____ without adding functionality
Power
168
Excess ____ capacity results in more power drain and less useful life on a battery charge
Compute
169
_____ limitations are due to constraints from power and connectivity _____ devices require a radio transceiver, increasing power demands
Network
170
_______ functions can be essential to secure data during transmission but the The level of computational resources for ____ functions can be substantial
Cryptographic functions
171
This is typically caused by a series of design decisions predicated on producing single-purpose devices like a Raspberry Pi or Arduino
Inability to patch
172
_______ systems are critical system requirements sometimes not adopted by embedded and specialized systems
Authentication
173
What is a function of power and is a limitation of many specialized and embedded systems
Range
174
Extra functionality leads to extra ___ If this functionality isn’t needed in the final solution, the money is wasted
Cost
175
refers that trust that has not been specifically set up but exists
Implied Trust
176
________ are physical barriers that are designed for an attacker to only gain access by a single gap A _______ is a simple post-type barricade that prevents a vehicle from passing but allows people to walk past
Barrier Bollard
177
An _______ _____ ______ is composed of two closely spaced doors that require the user to card through one and then the other sequentially
access control vestibule
178
A _____ with a picture on it can enable others to quickly determine the identity of an employee or recognize an intruder
Badge
179
______ can provide information as to areas that are restricted, or it can indicate where specific precautions, such as keeping doors locked, are required
Signage
180
______ enable the re-creation of scenes at a later date Video ____ offer an even greater range of surveillance capability
Camera
181
What technology can sense differences in temperature, which can be from a person entering a room
Motion recognition
182
What technology can scan video for movement and detect people, cars, and other designated objects such as packages left on a porch
Object detection
183
______ are used to monitor a workplace for security purposes These systems are commonplace places with high-value merchandise that is attractive to thieves like banks and jewelry stores
Closed-circuit television
184
Utilities that made physical modifications less conspicuous and improve the visual surroundings An example is 58 Joralemon Street, New York City, which is a ventilation shaft and emergency access to the New York subway
Industrial Camouflage
185
What provides a simple means of securing portable equipment to furniture or another fixture in the room where the equipment resides
Cable locks
186
______ are devices that impede a specific function unless a code is entered This code is compared to a stored secret, and if the correct code is entered, the lock engages the mechanical stop and allows the mechanism to open
Electronic Locks
187
Laptops are popular targets for thieves and should be locked inside a desk when not in use, or secured with special computer lockdown cables
Locks
188
What prevents attackers from infecting a device with malware or stealing data
USB Data Blocker
189
What is a Class A fire?
Common Combustibles, Wood, Paper. Water or Dry chemical, ASHE
190
What is a class B fire?
Combustible liquids, petroleum products/organic solvents Co2 or dry chemical
191
What is a class C fire?
Electrical, electrical equipment, wiring, or tools. Co2 or dry chemical Class SEE
192
What is a class D fire?
Flammable metals like magnesium or titanium, copper metal or sodium chloride
193
A ____ _____ can send alerts in areas where there is little or no expected traffic _____ ______can be used to trigger video systems, so they do not record large amounts of “empty” activity
Motion Detectors
194
What are sensors that provide a signal at a specified distance The most common application of these are card readers connected to doors
Proximity readers
195
What sensors provide a remote means of monitoring everything from water leaks to humidity problems
Moisture Detection
196
What can provide much greater detail in tracking who is in a facility and when they have come and gone
Cards
197
What should be placed in highly temperature-controlled areas such as server rooms
Temperature sensors
198
What can provide security to physical facilities remotely, providing eyes on demand in a variety of places
Drones
199
What is an enclosure that’s designed to contain the transmission of radio signals
A faraday cage
200
What is a term used to describe the physical and logical separation of a network from all other networks This separation is designed to prevent unauthorized data transfers to and from the network
Air Gap
201
A security zone that contains public facing servers or systems where access is restricted
Screened Subnet
202
provides security to the cabling between systems from all physical hazards, including interception and tapping
Protected cable distribution
203
____ _____ are those areas where specific preventative measures are taken to control access both to and from _____ _____limit information and people flow in and out of the area
Secure areas
204
An ___ ___ is a security measure implemented to ensure that systems within a secure network are totally isolated (not connected) from an unsecure network such as the Internet
Air gap
205
A ____ is a secured area that is designed to provide a specific level of security for what is stored inside
Vault
206
are physical storage devices that are intended to impede unauthorized access to their protected contents
Safes
207
A data center that is arranged into ____ _______ dictates that all the intake fans on all equipment face the cold aisle and that the exhaust fans all face the opposite aisle
Hot & Cold Aisles
208
Once the storage media is rendered into a form that can be destroyed by fire, the chemical processes of fire are irreversible and render the data lost forever
Burning
209
is a process by which paper fibers are suspended in a liquid and recombined into new paper
Pulping
210
is a physical process of destruction using excessive physical force to break an item into unusable pieces
Pulverizing
211
______ realigns the magnetic particles, removing the organized structure that represented the data ______ effectively destroys all data on the media
Degaussing
212
Vendors sell data destruction as a service These vendors can take advantage of scale, increasing the capability while sharing the cost of equipment
Third Party Solutions
213
_____ ______ are the result of a hashing algorithm used to sign a message A ______ _______ system is used to ensure that a message was not altered during transmission, and that the message did in fact come from the sender and not an imposter
Digital Signature
214
The strength of a cryptographic function typically depends upon the strength of a key The more valuable the data, the longer the key should be
Key Length
215
___ _______is a mechanism that takes what would be weak keys and “stretches” them to make the system more secure against brute-force attacks
Key Stretching
216
______ is the practice of placing random digits at the end of a password prior to the hashing process ______ increases the complexity of the hash therefore increasing the work factor required to decrypt a message
Salting
217
is used to ensure the accuracy of data A ______ function is used to derive an output with a fixed length from a message with a variable length
Hashing
218
With symmetric encryption the message to be protected is encrypted and decrypted using the same secret key Asymmetric encryption uses two separate keys to encrypt and decrypt the message
Key Exchange
219
What allows the client’s session key to be encrypted with the server’s public key, but the public key never changes If an attacker steals the server’s private key in the future, they could then decrypt the stored, captured traffic
Diffie-Hellman Exchange (DHE)
220
What is based on a discrete logarithm problem that mathematicians believe to be extremely difficult to solve The derived key length from an elliptic curve algorithm is smaller in comparison to RSA with the same equivalency in work factor
Elliptic curve cryptography
221
What is a property of a public key system in which a key derived from another key is not compromised, even if the originating key is compromised in the future
Perfect forward secrecy (PFS)
222
Quantum computers use a structure called qubits, which allow information to be represented differently than just “on” or “off ” as binary bits do
Quantum communications
223
Quantum hardware is still in its early stages of development, and the immense computing power in these platforms will revolutionize cryptography Quantum cryptography is the use of quantum _______ hardware to perform encryption and decryption processes
Computing
224
There are currently several cryptographic algorithms that have been developed to use different mathematical properties These algorithms make simultaneous solution sets not as effective, thus limiting the power of quantum computing
Post Quantum-Era
225
are cryptographic keys that are used only once after generation
Ephemeral keys
226
________ encryption with associated data (AEAD) is a form of encryption designed to provide both confidentiality and authenticity services A wide range of _________ modes is available for developers, including GCM, OCB, and EAX
Authenticated
227
What modes use a non-identity-based source for the entropy element for subsequent blocks Each block is XORed with the previous ciphertext block before being encrypted
Unauthenticated
228
_______ mode (CTM) uses a “_____” function to generate a nonce that is used for each block encryptionDifferent blocks have different nonces, enabling parallelization of processing and substantial speed improvements
Counter
229
What are lists of records, where each addition to the list is done by a cryptographic algorithm The concept of this was invented to create the public transaction ledger of cryptocurrencies
Blockchain
230
What is a negotiated package of algorithms, ciphers, and protocols used to manage a conversation between two systems This suite will list the key exchange mechanism, the authentication protocol, the block/stream cipher, and message authentication
Cipher suite
231
What is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 bits) at once as a group rather than to one bit at a time
Block Cipher
232
What is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. _________ are often used for their speed and low latency
Stream Cipher
233
_________ encryption tends to be faster, is less computationally involved, and is better for bulk transfers. __________ encryption uses two keys, and it is slower but more secure
Symmetric Asymmetric
234
What is a specialized suite of cryptographic algorithms designed to operate in IoT environments that are resource-constrained
Lightweight cryptography
235
What is the art of using cryptographic techniques to embed secret messages within another message
Steganography
236
H is a set of algorithms that allows operations to be conducted on encrypted data, without decrypting and re-encryptin
Homomorphic encryption
237
Cryptographic functions tend to take significant computational powerCryptographic functions such as elliptic curve cryptography are well suited for ______ ____
Low-power devices
238
Stream ciphers are examples of ____ ________ cryptographic operations that support operations with time constraints
Low-Latency
239
Cryptographic solutions can help systems to resume normal operational conditions after an external disruption
High Resiliency
240
Cryptography is the primary means of protecting data confidentiality—at rest, in transit, and in use
Supporting Confidentiality
241
Message authentication codes (MACs) supported by hash functions are an example of cryptographic services supporting integrity
Supporting integrity
242
Encryption systems can protect code from casual observation by unauthorized parties
Supporting obfuscation
243
Cryptographic functions can be employed to demonstrate authentication, such as the validation that an entity has a specific private key associated with a presented public key
Supporting authentication
244
What is the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information
Support Non Repudiation
245
The more complex the algorithm, the more rounds that are performed and the stronger the encryption, but the slower the throughput
Speed
246
What is a means of approximating strength, at a cost of speed, Longer keys take longer to generate, and the more rounds a system operates, the longer the time to encrypt/decrypt
Size
247
What are keys that result in weak encryption, despite its key length Currently DES, RC4, IDEA, Blowfish, and GMAC algorithms can suffer from weak keys
Weak Key
248
The objective of cryptography is to protect data for a long-enough period that brute-force decryption is not a factor in the security equation, Older methods, such as DES, have proven to no longer provide long protection times due to modern computing speeds.
Time
249
If we want to protect materials for the next 25 years, we need to consider what computing power will be available in the next 25 years—a challenge given advances in quantum computing
Longevity
250
The use of cryptographic random numbers is important, as it removes the _______ problem of pseudorandom number generators
Predictability
251
The more material that an attacker can get using the same key, the greater his ability to use cryptanalysis tools to break the scheme. This is how the Enigma and Purple machines failed during WWII
Reuse
252
What is the measure of randomness associated with a series of values A lack of good _______ may leave a cryptosystem vulnerable and unable to securely encrypt data
Entropy
253
One of the limitations of a cryptographic system is the level of ______ ______ needed to generate the system Different algorithms have differing means of computing the complexity that makes cryptographic solutions secure
computational overhead
254
Constraints the intended use of the system should be considered when determining its cryptographic solution
Resource vs. Security