Flashcards in IS3340 CHAPTER 4 Deck (53):
An encryption algorithm adopted by the US government in 2002 as the standard for encryption operations and is called ___?
ADVANCED ENCRYPTION STANDARD (AES)
Cryptographic algorithm that uses two related keys -- one key to encrypt data and another key to decrypt data and is called ___?
A Window feature that encrypts entire volumes and normally uses a computer's Trusted Platform Module (TPM) hardware to store encryption keys is called ___?
A Windows feature that encrypts removable media devices is called ___?
BITLOCKER TO GO
Any device, typically a CD, DVD, or USB key, from which a computer will boot and load an operating system is called ___?
A computer that stores digital certificates and issues them to authenticated subjects is called ___?
Algorithm for performing encryption and decryption is called ___?
Data that is stored on a persistent storage device, such as a disk drive is called ___?
DATA AT REST
Data that is currently being transported from one location to another, as in a transfer across a network connection is called ___?
DATA IN TRANSIT
The process of transforming previously encrypted information back into a readable format is called ___?
Another term for security certificate is called ___?
A public key cryptographic algorithm based on the structure of elliptic curves and is called ___?
ELLIPTIC CURVE CRYPTOGRAPHY (ECC)
A Window feature that provides transparent file and folder encryption. Encryption keys in this are based on a user's password ___?
ENCRYPTING FILE SYSTEM (EFS)
The process of transforming readable information into unreadable information in such a way that anyone with a proper key can reverse the process, making the information readable again is called ___?
A device or software program to filter data passing through the device or program, limiting network traffic to authorized traffic only is called ___?
A framework of open standards for protecting communications over Internet Protocol (IP) networks is called ___?
INTERNET PROTOCOL SECURITY (IPSec)
A piece of information that an encryption/decryption algorithm needs as input to transform a document is called ___?
A tunneling protocol used to support VPNs is called ___?
LAYER 2 TUNNELING PROTOCOL (L2TP)
This allows a sender to verify the source of a message and is called ___?
Unencrypted data, AKA clear text called ___?
A tunneling protocol used to support VPNs is called
POINT TO POINT TUNNELING PROTOCOL (PPTP)
A shared secret used by cryptographic algorithms to perform symmetric encryption and decryption is called ___?
Cryptographic algorithm that uses two related keys -- one key to encrypt data and another key to decrypt data is called ___?
PUBLIC KEY CRYPTOGRAPHY
A general approach to handling encryption keys using trusted entities and digital certificates; the hardware, software, policies, and procedures to manage all aspects of digital certificates is called ___?
PUBLIC KEY INFRASTRUCTURE (PKI)
Key that can be used to decrypt BitLocker-protected data if the primary key is lost or damaged is called ___?
A computer that authenticates subjects and directs the CA to issue digital certificates to authenticated subjects is called ___?
REGISTRATION AUTHORITY (RA)
VPN protocol that creates an encrypted tunnel over SSL/TLS is called ___?
SECURE SOCKET TUNNELING PROTOCOL (SSTP)
The predecessor to TLS, this is a cryptographic protocol that operates at the transport network layer and provides security for communications across the Internet is called ___?
SECURE SOCKETS LAYER (SSL)
A document that contains identity information and a public key, along with other descriptive information is called ___?
A card or device that stores information used for authentication or encryption is called ___?
Encryption algorithm that uses a single key for both encryption and decryption is called ___?
SYMMETRIC KEY ALGORITHM
Cryptographic protocol that operates at the transport network layer and provides security for communications across the Internet is called ___?
TRANSPORT LAYER SECURITY (TLS)
Microchip designed to securely store cryptographic keys is called ___?
TRUSTED PLATFORM MODULE (TPM)
A computer from which digital certificates are accepted is called ___?
A computer network that is implemented over an existing network, often to provide an encrypted tunnel to exchange data securely is called ___?
VIRTUAL PRIVATE NETWORK (VPN)
A server that receives a Web request, processes the request based on defined filters, and acts on the request based on defined rules. Rules can include actions such as forward, drop, deny, and translate is called ___?
Algorithm designed to replace WEP by providing secure wireless communications is called ___?
WI-FI PROTECTED ACCESS (WPA)
Legacy algorithm designed to secure wireless communications is called ___?
WIRED EQUIVALENT PRIVACY (WEP)
1. Which of the following is the strongest reason why operating system access controls are insufficient to secure objects?
1. It's possible to boot into another operating system and format the disk
2. Strong passwords longer than 24 characters are not common
3. It is possible to boot into another operating system and bypass access controls
4. It is often possible to find a user's password written down
It is possible to boot into another operating system and bypass access controls
2. What piece of information is necessary to encrypt and decrypt data?
4. Recovery agent
3. Which Window feature allow you to encrypt entire volumes?
4. Which Windows feature uses keys based on a user's password?
5. Where does BitLocker store encryption keys for transparent mode?
1. USB key
2. Recovery file
6. Which operating system does NOT have BitLocker enable by default?
1. Windows Server 2008
2. Windows Vista
3. Windows 7 Premium
4. Windows 7 Ultimate
Windows Server 2008
7. which of the following services does communication encryption NOT provide?
8. Which protocol commonly provides a secure channel for HTTPS?
9. Which VPN protocol has the fewest issues with NATs and firewalls?
10. Which of the following is the weakest wireless protocol (and should never be used)?
11. Which type of encryption algorithm uses two related keys?
12. Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?
1. Digital signature
2. Digital certificate
3. Certificate authority
4. Private key
13. What is a general approach to handling keys using trusted entities and digital certificates?
14. Which common folder should be encrypted for all users?
2. Program Files
3. My Documents
4. My Secure Files