A developer wants to send a system administrator a message and wants to use a cipher that reorders the plaintext characters to create the ciphertext. Which cipher meets this requirement? - Transposition cipher, A developer wants to encrypt a data stream using a symmetric key and wants to encrypt the data in such a way that the cipher method encrypts the individual bits. Which cipher method can the developer use to meet this requirement? - Stream cipher, the science of keeping information secret and safe by transforming it into a form that unintended recipients cannot understand using an algorithm (a series of mathematical operations) - cryptography, the art of breaking or “cracking” the protection provided through cryptography algorithms - cryptanalysis, the study and practice of both cryptography and cryptanalysis - cryptology, a human-readable unencrypted message used as an input to a cipher (encryption algorithm) before encryption or after decryption - plaintext, unreadable encrypted message output after an encryption algorithm has been used on the plaintext - ciphertext, the process (or algorithm) used to encrypt and decrypt a message - cipher, A developer and a system administrator agreed on using a sequence of dots ( . ) and dashes ( - ) to communicate with each other. The developer and system administrator believe the message is secure as long as an intruder does not know the type of encoding used. What cipher method are the developer and system administrator using to communicate? - Morse code, involves using two keys, one key (public key) to encrypt data and the other key (private key) to decrypt the encrypted data; also called public-key encryption - asymmetric encryption, involves using one shared key to encrypt and decrypt data; also called secret-key encryption - symmetric encryption, involves breaking down plaintext messages into fixed-size blocks before converting them into ciphertext using a key - block encryption, an encryption algorithm that breaks a plaintext message down into single bits and encrypts 1 bit of plaintext at a time - stream encryption, involves mapping the hashed values back to the original message from a precomputed lookup “rainbow” table - rainbow attack, the process of systematically entering every word in a dictionary as a password to see if the hashed code matches the one in the password file - dictionary attack, involves adding an initialization vector to the first block of the plaintext and combining the output with the next plaintext block until the process is repeated through the full “chain” of blocks - cipher block chaining, A developer wants to send an encrypted message to a system administrator by generating a hash value for the message. The developer is also afraid that a third party might be able to reverse the derived cipher back to the original message. Which attack method is commonly used to map the hashed values back to the original message? - Rainbow table attack, A developer wants to encrypt a real-time application where speed and simplicity are both requirements. The developer wants to use a cipher method that can operate on the data stream to encrypt the individual bit of the message one by one. Which encryption method meets these requirements? - Stream encryption, involves mapping the hashed values back to the original message from a precomputed lookup “rainbow” table - rainbow table attack, the process of systematically entering every word in a dictionary as a password to see if the hashed code matches the one in the password file - dictionary attack, a trial-and-error method in which an attacker keeps trying different passwords or passphrases combinations to see if there is a match - brute-force attack, when an attacker positions himself in a conversation between two parties in order to eavesdrop or impersonate one of the parties - man-in-the-middle (MITM) attack, the process of adding an initialization vector to the ciphering process to change its operation and ensure that the ciphertext does not give the original plaintext when played back - salting, measures the amount of unpredictability, and in encryption it relates to the degree of uncertainty of the encryption process - entropy, A system administrator wants to encrypt a computer hard drive to make sure the contents of the computer are not readable in case the computer is lost or stolen. The encryption method must be efficient, scalable, and secure. Which encryption method meets this requirement if the administrator wants to minimize the impact on the computer's CPU? - Trusted platform module, A developer wants to encrypt an HTML file on his MacBook using an AES encryption. Which command should the developer run in the terminal to encrypt the HTML file? - aescrypt -e filename.html, a tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing - hardware security module (HSM), A dedicated processor that handles hardware-level encryption; allows you to encrypt data on your device - trusted platform module (TPM):, the process of using an algorithm to transform data stored in a database into ciphertext to protect the data stored in a database from being accessed by someone with malicious intentions - database encryption, a symmetric 128-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES - Advanced Encryption Standard (AES), Which of these hashing methods provides the best method for generating a unique password each time based on an initial seed value? - One-time passwords (OTP), A password is typically hashed on Windows and Linux to make it difficult for an intruder to determine the password. Which method is used in Microsoft Windows to store users' hashed passwords for computers that connect to an Active Directory domain? - NTLMv2, a random match in hash values that occurs when a hashing algorithm produces the same hash value for two distinct messages - collision, provides a fingerprint for data and is used to prove identity and integrity of messages and entities; most common ones are MD5, SHA-1, and SHA-256 - message digest, What are two applications of public-key encryption? - Secret-key protection and identity checking, A developer wants to send a system administrator an encrypted email message and uses a system administrator’s email address to generate the public key. Which encryption method is a developer using in this process? - Identity-based encryption, used to prove the identity of the sender of a message and to show that a message has not been tampered with - digital signature, a large numerical value used to encrypt a message or check the validity of a digital signature; it is often provided by a trusted, designated authority and made available to everyone through a publicly accessible repository or directory - public key, a key known only to its owner; used to create digital signatures and to decrypt messages that were created with the paired public key - private key, is a trusted third party in a public-key infrastructure (PKI) that is responsible for managing and issuing public-key certificates and allows anyone to trust the identity of the person or server issuing a public key - certificate authority (CA, How can you make sure that all the session keys used in client-server key exchange are not compromised even if the server's long-term encryption key is compromised? - Perfect Forward Secrecy, A developer wants to share a secret key with a system administrator using a public key encryption method for the key exchange. What is the first step in the process of sending the session key to a system administrator? - The system administrator sends the developer a public key., a key exchange method where a different key is used for each connection - Ephemeral Diffie-Hellman (DHE, a key exchange method that uses a key exchange method based on an elliptic-curve Diffie-Hellman (ECDH) key exchange - elliptic-curve Diffie-Hellman Ephemeral (ECDHE), Which method of authentication involves authenticating only part of the conversation between the sender and the receiver? - Intermediate authentication, Which system is used to generate digital certificates that could be trusted by both parties? - PKI, is used to distribute and verify the public key of the owner - digital certificate, is a trusted source for generating digital certificates - certificate authority (CA), used to generate digital certificates that both entities in a communication could trust - public-key infrastructure (PKI), a list of digital certificates that have been revoked by the issuing certificate authority - certificate revocation list (CRL), a block of encoded data given to a certificate authority when applying for an SSL certificate; it is usually generated on the server where the certificate will be installed and contains information that will be included in the certificate and the public key that will be included in the certificate - certificate signing request (CSR), Which security components are provided by digital signature? - Integrity, non-repudiation, and proof of origin, Which combination of cryptographic algorithms is used to create digital signatures based on the U.S. Digital Signature Standards? - SHA-2 and RSA, proving where a message came from - proof of origin,

D334-HNO1-EXAM PREP_Pre-Assessment

Leaderboard

Flash cards is an open-ended template. It does not generate scores for a leaderboard.

Visual style

Options

Switch template

Continue editing: ?