Review 15 Flashcards
(15 cards)
What is an encryption tool that encrypts emails, digitally signs emails, and encrypts documents, and is an implementation of the Pretty Good Privacy (PGP) Protocol?
Question options:
TPM
EFS
GPG
Bitlocker
GPG
Which cryptographic method is one of the newer methods being implemented, and is able to generate smaller keys that are more secure than most other methods?
Question options:
ECC
RC
Perfect Forward Secrecy
DES
ECC
Which type of encryption is useful when a large amount of data needs to be encrypted as the encryption process requires less CPU power than other encryption methods?
Question options:
Hybrid
Asymmetric
Symmetric
None of these
Symmetric
Which code-breaking method uses many non-repeating groups of letters or number keys that are chosen randomly?
Question options:
One-time pad
Brute force
Adaptive plain text
Frequency analysis
One-time pad
_________ is defined as the process of writing or solving messages using a secret code.
Question options:
Hashing
Cryptography
Encryption
Cipher
Cryptography
What term describes the technique of hiding or concealing a file, message, image, or video within another file, message, image, or video?
Question options:
Cryptography
Steganography
Salting
Hashing
Steganography
What term describes a reputable organization, responsible for issuing public certificates to other companies or organizations for secure communication over the internet?
Question options:
CRL
OCSP
CA
PKI
CA
What term describes a hardware chip on the motherboard that can generate and store cryptographic keys?
Question options:
HSM
BIOS
SHA
TPM
TPM
___________ is the study of ciphers, ciphertext, or cryptosystems with the intent to identify vulnerabilities that allow plain text to be extracted from the ciphertext, even if the cryptographic key or algorithm used to encrypt the plain text is unknown.
Question options:
Cipheranalysis
Steganography
Cryptanalysis
Cryptography
Cryptanalysis
Which type of encryption uses one key to lock the data and a separate key to unlock it.
Question options:
Asymmetric
Hashed
Salted
Symetric
Asymmetric
________ is the process of converting one value into another using a mathematical algorithm like MD5 or SHA.
Question options:
Cryptography
Cipher
Encryption
Hashing
Hashing
What tool was introduced in Windows Vista and is used to encrypt an entire volume, not just individual files and folders?
Question options:
GPG
TPM
Encrypting File System (EFS)
Bitlocker
Bitlocker
Which of the following statements regarding Digital Signatures is NOT true?
Question options:
A digital signature verifies that the data is legitimate.
A digital signature provides non-repudiation.
Utilizes asymmetric encryption.
By combining a user’s public encryption key and a hash of the data, a user can create a digital signature.
By combining a user’s public encryption key and a hash of the data, a user can create a digital signature.
Which of the following is used to verify that a downloaded file has not been altered?
Question options:
Hash
Symmetric encryption
Asymmetric encryption
Private key
Hash
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?
Question options:
Mary’s private key
Mary’s public key
Sam’s public key
Sam’s private key
Sam’s public key