Domain 3 set 6 Flashcards

(35 cards)

1
Q

A standard proposed by credit card issuers but never became widely adopted.

A

Secure electronic transaction (SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphers that use multiple alphabets on a rotating basis.

A

Polyalphabetic substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chosen Plaintext Attack

A

The attacker can create an encrypted message of his choice, to figure out the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES key lengths.

A

128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography

A

The science of protecting data so that it may be stored and transmitted between parties while preserving confidentiality and/or integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Twofish key length.

A

256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DES modes that allow errors to propagate.

A

CBC, CFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Frequency Analysis?

A

Used to detect patterns in ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital signatures use what type of algorithm?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NAND (not AND)

A

Logical function that is true only when one or both elements are false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AND

A

Logical function that is true only when both arguments are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 main product evaluation models?

A
  1. TCSEC Orange book
  2. ITSEC
  3. Common Criteria
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when you fill a known gap in physical security?

A

Compensating Control ( placing a guard at the gate entry)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NOT

A

Logical function that is true only when a single argument is false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RC5 key length.

A

up to 2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptology

A

The science that involves the use of codes and cyphers to obscure the meaning of a message.

17
Q

Cryptanalysis

A

The science of breaking cryptographic algorithms to obtain the secret message without authorization.

18
Q

Hash that produces a 160 bit digest.

19
Q

AES?
Types of algorithm
block or stream

A

Symmetric

128 bit Blocks

20
Q

AES block length.

21
Q

NOR (not OR)

A

Logical function that is true only when both elements are false.

22
Q

Rijndael is what encryption?

23
Q

Blowfish key length.

A

32 to 448 bits

24
Q

Four modes of DES encryption.

A

ECB, CBC, CFB, OFB

25
how 3DES modes modes?
3
26
Statistical
Uses a mathematical analysis of a message to break the cryptosystem.
27
Mail encryption that uses 3DES, RSA, MD5, and X.509.
Privacy enhanced mail (PEM)
28
Four modes of 3DES.
DES-EEE3, DES-EDE3, DES-EEE2, DES-EDE2
29
AES key size and rounds?
128 bit - 10 rounds 192 bit - 12 rounds 256 bit - 14 rounds
30
Cryptosystems
Sets of techniques that implement cryptography.
31
What is the differant in a Code then a cipher?
A Code is a system the substitutes one word or phrase for another for secrecy or efficiency. Example the 10 code used by police (10-20).
32
Hash that produces a 256 bit digest.
SHA-256
33
XOR (exclusive OR)
Logical function that is true only when one of the elements is true and the other is false.
34
Known plaintext attack
the attacker has access to the unencrypted message
35
3DES? Types of algorithm rounds key length
Symmetric 64- bit Blocks 48 rounds key length 112 bits