IS3340 CHAPTER 4 Flashcards Preview

IS3340 SEC. STRAT. IN WINDOWS PLATFORM & APPS. > IS3340 CHAPTER 4 > Flashcards

Flashcards in IS3340 CHAPTER 4 Deck (53)
Loading flashcards...
1
Q

An encryption algorithm adopted by the US government in 2002 as the standard for encryption operations and is called ___?

A

ADVANCED ENCRYPTION STANDARD (AES)

2
Q

Cryptographic algorithm that uses two related keys – one key to encrypt data and another key to decrypt data and is called ___?

A

ASYMMETRIC ALGORITHM

3
Q

A Window feature that encrypts entire volumes and normally uses a computer’s Trusted Platform Module (TPM) hardware to store encryption keys is called ___?

A

BITLOCKER

4
Q

A Windows feature that encrypts removable media devices is called ___?

A

BITLOCKER TO GO

5
Q

Any device, typically a CD, DVD, or USB key, from which a computer will boot and load an operating system is called ___?

A

BOOT DEVICE

6
Q

A computer that stores digital certificates and issues them to authenticated subjects is called ___?

A

CERTIFICATE AUTHORITY

7
Q

Algorithm for performing encryption and decryption is called ___?

A

CIPHER

8
Q

Data that is stored on a persistent storage device, such as a disk drive is called ___?

A

DATA AT REST

9
Q

Data that is currently being transported from one location to another, as in a transfer across a network connection is called ___?

A

DATA IN TRANSIT

10
Q

The process of transforming previously encrypted information back into a readable format is called ___?

A

DECRYPTION

11
Q

Another term for security certificate is called ___?

A

DIGITAL CERTIFICATE

12
Q

A public key cryptographic algorithm based on the structure of elliptic curves and is called ___?

A

ELLIPTIC CURVE CRYPTOGRAPHY (ECC)

13
Q

A Window feature that provides transparent file and folder encryption. Encryption keys in this are based on a user’s password ___?

A

ENCRYPTING FILE SYSTEM (EFS)

14
Q

The process of transforming readable information into unreadable information in such a way that anyone with a proper key can reverse the process, making the information readable again is called ___?

A

ENCRYPTION

15
Q

A device or software program to filter data passing through the device or program, limiting network traffic to authorized traffic only is called ___?

A

FIREWALL

16
Q

A framework of open standards for protecting communications over Internet Protocol (IP) networks is called ___?

A

INTERNET PROTOCOL SECURITY (IPSec)

17
Q

A piece of information that an encryption/decryption algorithm needs as input to transform a document is called ___?

A

KEY

18
Q

A tunneling protocol used to support VPNs is called ___?

A

LAYER 2 TUNNELING PROTOCOL (L2TP)

19
Q

This allows a sender to verify the source of a message and is called ___?

A

NONREPUDIATION

20
Q

Unencrypted data, AKA clear text called ___?

A

PLAIN TEXT

21
Q

A tunneling protocol used to support VPNs is called

A

POINT TO POINT TUNNELING PROTOCOL (PPTP)

22
Q

A shared secret used by cryptographic algorithms to perform symmetric encryption and decryption is called ___?

A

PRE-SHARED KEY(PSK)

23
Q

Cryptographic algorithm that uses two related keys – one key to encrypt data and another key to decrypt data is called ___?

A

PUBLIC KEY CRYPTOGRAPHY

24
Q

A general approach to handling encryption keys using trusted entities and digital certificates; the hardware, software, policies, and procedures to manage all aspects of digital certificates is called ___?

A

PUBLIC KEY INFRASTRUCTURE (PKI)

25
Q

Key that can be used to decrypt BitLocker-protected data if the primary key is lost or damaged is called ___?

A

RECOVERY KEY

26
Q

A computer that authenticates subjects and directs the CA to issue digital certificates to authenticated subjects is called ___?

A

REGISTRATION AUTHORITY (RA)

27
Q

VPN protocol that creates an encrypted tunnel over SSL/TLS is called ___?

A

SECURE SOCKET TUNNELING PROTOCOL (SSTP)

28
Q

The predecessor to TLS, this is a cryptographic protocol that operates at the transport network layer and provides security for communications across the Internet is called ___?

A

SECURE SOCKETS LAYER (SSL)

29
Q

A document that contains identity information and a public key, along with other descriptive information is called ___?

A

SECURITY CERTIFICATE

30
Q

A card or device that stores information used for authentication or encryption is called ___?

A

SMART CARD

31
Q

Encryption algorithm that uses a single key for both encryption and decryption is called ___?

A

SYMMETRIC KEY ALGORITHM

32
Q

Cryptographic protocol that operates at the transport network layer and provides security for communications across the Internet is called ___?

A

TRANSPORT LAYER SECURITY (TLS)

33
Q

Microchip designed to securely store cryptographic keys is called ___?

A

TRUSTED PLATFORM MODULE (TPM)

34
Q

A computer from which digital certificates are accepted is called ___?

A

TRUSTED SOURCE

35
Q

A computer network that is implemented over an existing network, often to provide an encrypted tunnel to exchange data securely is called ___?

A

VIRTUAL PRIVATE NETWORK (VPN)

36
Q

A server that receives a Web request, processes the request based on defined filters, and acts on the request based on defined rules. Rules can include actions such as forward, drop, deny, and translate is called ___?

A

WEB PROXY

37
Q

Algorithm designed to replace WEP by providing secure wireless communications is called ___?

A

WI-FI PROTECTED ACCESS (WPA)

38
Q

Legacy algorithm designed to secure wireless communications is called ___?

A

WIRED EQUIVALENT PRIVACY (WEP)

39
Q
  1. Which of the following is the strongest reason why operating system access controls are insufficient to secure objects?
  2. It’s possible to boot into another operating system and format the disk
  3. Strong passwords longer than 24 characters are not common
  4. It is possible to boot into another operating system and bypass access controls
  5. It is often possible to find a user’s password written down
A

It is possible to boot into another operating system and bypass access controls

40
Q
  1. What piece of information is necessary to encrypt and decrypt data?
  2. Key
  3. Salt
  4. TPM
  5. Recovery agent
A

Key

41
Q
  1. Which Window feature allow you to encrypt entire volumes?
  2. EFS
  3. Truecrypt
  4. BitLocker
  5. AppLocker
A

BitLocker

42
Q
  1. Which Windows feature uses keys based on a user’s password?
  2. EFS
  3. Truecrypt
  4. BitLocker
  5. AppLocker
A

EFS

43
Q
  1. Where does BitLocker store encryption keys for transparent mode?
  2. USB key
  3. Recovery file
  4. EFS
  5. TPM
A

TPM

44
Q
  1. Which operating system does NOT have BitLocker enable by default?
  2. Windows Server 2008
  3. Windows Vista
  4. Windows 7 Premium
  5. Windows 7 Ultimate
A

Windows Server 2008

45
Q
  1. which of the following services does communication encryption NOT provide?
  2. Confidentiality
  3. Nonrepudiation
  4. Integrity
  5. Availability
A

Availability

46
Q
  1. Which protocol commonly provides a secure channel for HTTPS?
  2. SSL/TLS
  3. PPTP
  4. S-PPTP
  5. L2TP
A

SSL/TLS

47
Q
  1. Which VPN protocol has the fewest issues with NATs and firewalls?
  2. L2TP
  3. SSTP
  4. IPSec
  5. PPTP
A

SSTP

48
Q
  1. Which of the following is the weakest wireless protocol (and should never be used)?
  2. WPA
  3. PSK
  4. WEP
  5. SSID
A

WEP

49
Q
  1. Which type of encryption algorithm uses two related keys?
  2. Symmetric
  3. Balanced
  4. Private
  5. Asymmetric
A

Asymmetric

50
Q
  1. Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?
  2. Digital signature
  3. Digital certificate
  4. Certificate authority
  5. Private key
A

Digital certificate

51
Q
  1. What is a general approach to handling keys using trusted entities and digital certificates?
  2. PKI
  3. IPSec
  4. WPA-PSK
  5. SSTP
A

PKI

52
Q
  1. Which common folder should be encrypted for all users?
  2. Windows
  3. Program Files
  4. My Documents
  5. My Secure Files
A

My Documents

53
Q
  1. Why is it recommended to encrypt folders instead of files?
  2. Individual files are written to disk unencrypted before being encrypted
  3. Folder encryption is faster
  4. Folder encryption results in less disk usage
  5. Individual files are encrypted first then written to disk
A

Individual files are written to disk unencrypted before being encrypted