Review 15 Flashcards

(15 cards)

1
Q

What is an encryption tool that encrypts emails, digitally signs emails, and encrypts documents, and is an implementation of the Pretty Good Privacy (PGP) Protocol?
Question options:

TPM

EFS

GPG

Bitlocker

A

GPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cryptographic method is one of the newer methods being implemented, and is able to generate smaller keys that are more secure than most other methods?

Question options:

ECC

RC

Perfect Forward Secrecy

DES

A

ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of encryption is useful when a large amount of data needs to be encrypted as the encryption process requires less CPU power than other encryption methods?

Question options:

Hybrid

Asymmetric

Symmetric

None of these

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which code-breaking method uses many non-repeating groups of letters or number keys that are chosen randomly?

Question options:

One-time pad

Brute force

Adaptive plain text

Frequency analysis

A

One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_________ is defined as the process of writing or solving messages using a secret code.

Question options:

Hashing

Cryptography

Encryption

Cipher

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term describes the technique of hiding or concealing a file, message, image, or video within another file, message, image, or video?

Question options:

Cryptography

Steganography

Salting

Hashing

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What term describes a reputable organization, responsible for issuing public certificates to other companies or organizations for secure communication over the internet?

Question options:

CRL

OCSP

CA

PKI

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes a hardware chip on the motherboard that can generate and store cryptographic keys?

Question options:

HSM

BIOS

SHA

TPM

A

TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ is the study of ciphers, ciphertext, or cryptosystems with the intent to identify vulnerabilities that allow plain text to be extracted from the ciphertext, even if the cryptographic key or algorithm used to encrypt the plain text is unknown.

Question options:

Cipheranalysis

Steganography

Cryptanalysis

Cryptography

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of encryption uses one key to lock the data and a separate key to unlock it.

Question options:

Asymmetric

Hashed

Salted

Symetric

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________ is the process of converting one value into another using a mathematical algorithm like MD5 or SHA.

Question options:

Cryptography

Cipher

Encryption

Hashing

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tool was introduced in Windows Vista and is used to encrypt an entire volume, not just individual files and folders?

Question options:

GPG

TPM

Encrypting File System (EFS)

Bitlocker

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements regarding Digital Signatures is NOT true?

Question options:

A digital signature verifies that the data is legitimate.

A digital signature provides non-repudiation.

Utilizes asymmetric encryption.

By combining a user’s public encryption key and a hash of the data, a user can create a digital signature.

A

By combining a user’s public encryption key and a hash of the data, a user can create a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is used to verify that a downloaded file has not been altered?

Question options:

Hash

Symmetric encryption

Asymmetric encryption

Private key

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?

Question options:

Mary’s private key

Mary’s public key

Sam’s public key

Sam’s private key

A

Sam’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly