Flashcards in Learning: 6.6 Explain common uses of encryption. Deck (7)
What option on iOS protects email and other apps’ data at-rest by using encryption?
The “Data Protection” option
What type of encryption is used by mobile applications to encrypt data in-transit?
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) is an implementation of asymmetric encryption used by mobile applications for encrypting data in-transit.
What password length is acceptable for an ordinary user account?
Nine to twelve characters
What type of password attack involves comparing encrypted passwords against a predetermined list of possible password values?
A dictionary attack
How can an administrator help make sure that a stolen password cannot be misused indefinitely?
Configuring a password expiration period
Which scenario is an example a stealing a password via a brute-force attack?
An attacker uses password-cracking software to attempt every possible alphanumeric password combination.