OSG-CH6 Flashcards

1
Q

data stored on hard drives, backup tapes, cloud storage services, USB devices, and other storage media.

A

Data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data being transmitted across a network between two systems.

A

Data in motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

stored in the active memory of a computer system, where it may be accessed by a process running on that system.

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

operation that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values.

A

one-way function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a random bit string that is the same length as the block size (the amount of data to be encrypted in each operation) and is XORed with the message.

A

Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

demonstrate knowledge of a fact (such as a password or key) without actually disclosing that fact to the other individual.

A

zero-knowledge proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

operation is divided among multiple users, no single person has sufficient privileges to compromise the security of an environment. This separation of duties and two-person control contained in a single solution

A

split knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

requires that a minimum number of agents out of the total number of agents work together to perform high-security tasks.

A

M of N Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The third party may use the escrowed key to either restore an authorized user’s access or decrypt the material themselves

A

recovery agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a cryptographic key is stored with a third party for safekeeping

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the time and effort required to perform a complete brute-force attack against an encryption system

A

work function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly