Exam 1: Introduction to Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A digital certificate is standardized as ____ under IETF RFC 2459.

(Multiple Choice)
4.9/5
(39)

____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

(Multiple Choice)
4.7/5
(40)

____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.

(Multiple Choice)
4.7/5
(31)

What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?

(Essay)
4.9/5
(46)

In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.

(Multiple Choice)
4.8/5
(30)

____________________ is the assurance that an entity is who it claims to be.

(Short Answer)
4.9/5
(30)

____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.

(Short Answer)
4.8/5
(36)

What information does a certificate contain?

(Essay)
4.7/5
(38)

The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.

(Multiple Choice)
4.7/5
(30)

What are the main advantages and disadvantages of Electronic Codebook (ECB)?

(Essay)
4.8/5
(41)

A software system is only as secure as its weakest link.

(True/False)
4.9/5
(35)

____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.

(Multiple Choice)
4.9/5
(35)

Describe the CBC rollover problem.

(Essay)
4.9/5
(25)

____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.

(Multiple Choice)
4.9/5
(39)

A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.

(Multiple Choice)
4.8/5
(37)

Encryption always ensures data integrity.

(True/False)
4.8/5
(35)

For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.

(Short Answer)
4.9/5
(39)

A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.

(Multiple Choice)
4.8/5
(38)

____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.

(Multiple Choice)
4.9/5
(31)

____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)