Lesson 7 Flashcards

1
Q

What does hashing do?

A

With hashing, it is very unlikely to determine the original document from the hash value.

answer: it’s a one-way encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption strength is a measure of:

A

Encryption strength is a measure of the encryption’s ability to resist brute force attacks. This is determined by the encryption community. The remaining items are not related to the definition of encryption strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric encryption uses:

A

Asymmetric encryption uses different keys for encryption and decryption. The remaining items either don’t describe asymmetric encryption, or would produce unreadable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric encryption uses:

A

Symmetric Encryption uses the same key for encryption and decryption. The remaining items either don’t describe symmetric encryption, or produce unreadable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The U.S. Government adopted AES as a standard in what year?

A

The US Government adopted AES as a standard in 2002 after a shake-down period. NIST released it during the previous year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES uses a blocking size of?

A

The block Size of AES is 128 bits. This is part of the technical description for the technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The National Institute of Standards and Technology (NIST) released AES in what year?

A

NIST released AES in 2001. It subsequently became a US Government standard the following year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A benefit of symmetric encryption is:

A

In terms of system performance, symmetric encryption is preferred to asymmetric encryption which adds to the size of the message to be sent and also increases message transmission time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following best defines cryptanalysis?

A

Cryptanalysis refers to the study of determining the cipher that was used when encrypting data. Once the cipher is determined, the encrypted data can then be decrypted and made readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Areas of weakness - What is cryptography - definitions and uses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The roots of modern encryption can be traced back almost _____ years.

A

4,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure user authentication in cryptography is achieved by _____.

A

password encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cryptography?

A

Cryptography is defined as the system by which data and information of value are stored or transmitted in such a way that only those for whom it is intended can read interpret or process it.
answer: crypt process of encrypt data in transmission or in storage prevent snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptography is used to conceal data in transmission by the use of _____.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly