Sec + Flashcards
Study for Sec+ (40 cards)
A digital signature provides ______, ________, and _________ in electronic mail.
integrity, authentication, and non-repudiation
Non-repudiation
ensures that the sender cannot deny the previous actions or message.
What ensures that the sender cannot deny the previous actions or message.
Non-repudiation
Integrity
Providing assurance that a message was not modified during transmission.
Authentication
The process of verifying that the sender is who he says he is.
Providing assurance that a message was not modified during transmission.
Integrity
The process of verifying that the sender is who he says he is.
Authentication
Digital signatures do not provide encryption and cannot ensure _____________.
availability
A digital signature is a hash value that is encrypted with the sender’s private key. For example, a file on Windows 98 that has been digitally signed indicates that the file has passed quality testing by Microsoft. The message is digitally signed. Therefore, it provides authentication, non-repudiation, and __________.
integrity
If a recipient wants to verify a digital signature, the ______ ______ of the signer must be used in conjunction with the ______ _______.
public key
hash value
Digital Signature Standard (DSS) defines digital signatures. It provides integrity and authentication. It is not a _________ ______ ____________.
symmetric key algorithm.
A digital signature cannot be spoofed. Therefore, attacks, such as man-in-the-middle attacks, cannot harm the integrity of the ___________.
message.
Microsoft uses _______ ________ to ensure the integrity of driver files.
digital signing
A digital signature cannot be ____________. Therefore, attacks, such as man-in-the-middle attacks, cannot harm the integrity of the ___________.
spoofed
message
Microsoft uses digital signing to ensure the integrity of _______ __________.
driver files
Advanced Encryption Standard
AES
AES= A_______ E_______ S_______
Advanced Encryption Standard
Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish are examples of symmetrical algorithms and pseudo-random number generation (PRNG). Symmetric algorithms are sometimes called b_____ c______.
block ciphers
Random number generation and pseudo-random number generation are types of algorithms used to generate c____________ keys.
cryptographic keys
PRNG uses a symmetric algorithm to generate a number that is “random enough” for cryptographic purposes. PRNG is used in A_S, D_S, and B______.
AES, DES, and Blowfish
Random number generation is used in asymmetric ciphers, such as R_A, D_____-H____, and E_____ C_____ C________ (E_C).
RSA, Diffie-Hellman, and Elliptic Curve Cryptosystem (ECC).
_________ is the cryptographic technique whereby a change of a single input bit results in a change of multiple output bits.
Diffusion
A collision is the result of a hashing algorithm producing the same ________ from two different inputs.
output
Obfuscation is the basic foundation of both ______ and _________. The term means to hide something so that it is not easily readable.
encryption and steganography