Deck 1: Introduction to Security Concepts
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 1: Introduction to Security Concepts
1
2)Encryption always ensures data integrity.
False
2
17)DSA was standardized as a federal information processing standard (____) called the digital signature standard (DSS).
A) FIPS-086
B) FIPS-112
C) FIPS-156
D) FIPS-186
A) FIPS-086
B) FIPS-112
C) FIPS-156
D) FIPS-186
D
3
12)Symmetric key encryptions ensure confidentiality and data ____.
A) integrity
B) privacy
C) availability
D) repudiation
A) integrity
B) privacy
C) availability
D) repudiation
B
4
4)DES is considered weak by today's standards due to the fact that the key size is only 56 bits.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
10)A(n) ____ uses a keystream composed of completely random digits.
A) XOR pad
B) block cipher
C) keystream cipher
D) one-time pad
A) XOR pad
B) block cipher
C) keystream cipher
D) one-time pad
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
18)____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.
A) Brute force
B) Dictionary attack
C) Meet-in-the-middle
D) Man-in-the-middle
A) Brute force
B) Dictionary attack
C) Meet-in-the-middle
D) Man-in-the-middle
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
20)A digital certificate is standardized as ____ under IETF RFC 2459.
A) X.501
B) X.509
C) X.512
D) X.529
A) X.501
B) X.509
C) X.512
D) X.529
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
6)A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.
A) IP address
B) ARP address
C) MAC address
D) DN
A) IP address
B) ARP address
C) MAC address
D) DN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
13)Schemes that involve hashing with secret keys are called ____ or keyed hashes.
A) MACs
B) checksums
C) parity bits
D) parity keys
A) MACs
B) checksums
C) parity bits
D) parity keys
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
1)A software system is only as secure as its weakest link.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
8)____ occurs when an attacker maliciously changes data in transit or in a medium.
A) Spoofing
B) Tampering
C) Replay attack
D) Snooping
A) Spoofing
B) Tampering
C) Replay attack
D) Snooping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
19)A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.
A) private key certificate
B) private key signature
C) public key signature
D) public key certificate
A) private key certificate
B) private key signature
C) public key signature
D) public key certificate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
7)In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.
A) tampering
B) snooping
C) sniffing
D) spoofing
A) tampering
B) snooping
C) sniffing
D) spoofing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
5)A common use for cryptographic hash functions is to provide password-storage solutions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
16)____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.
A) 3DES-EDE
B) Digital signatures
C) Symmetric encryption
D) Block ciphers
A) 3DES-EDE
B) Digital signatures
C) Symmetric encryption
D) Block ciphers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
14)____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.
A) Message authentication code
B) Digital certificate
C) Key agreement
D) Keyed hashes
A) Message authentication code
B) Digital certificate
C) Key agreement
D) Keyed hashes
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
3)Parallel encryption is possible with a block cipher operating in CFB mode.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
11)____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.
A) RC4
B) RC5
C) DES
D) AES
A) RC4
B) RC5
C) DES
D) AES
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
9)The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.
A) bit
B) character
C) block
D) byte
A) bit
B) character
C) block
D) byte
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
15)The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.
A) RSA
B) ElGamal
C) Diffie-Hellman
D) discrete logarithm
A) RSA
B) ElGamal
C) Diffie-Hellman
D) discrete logarithm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
23)____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.
A) PKCS
B) OID
C) ASN.1
D) ASCII
A) PKCS
B) OID
C) ASN.1
D) ASCII
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
27)____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
25)____s are used for naming almost every object type in X.509 certificates such as components of distinguished names, extensions, and so on.
A) OID
B) ASN.1
C) PKCS
D) Base64
A) OID
B) ASN.1
C) PKCS
D) Base64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
24)____ encoding literally means a positional numbering system using a base of 64.
A) ASN.1
B) Base64
C) OID
D) PKCS#64
A) ASN.1
B) Base64
C) OID
D) PKCS#64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
40)What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
21)____ means people who know each other can securely send messages to their friends.
A) Certificate Authority
B) PKI
C) Web of trust
D) Digital ring
A) Certificate Authority
B) PKI
C) Web of trust
D) Digital ring
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
30)A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
37)Describe a block cipher counter (CTR) mode of operation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
41)What information does a certificate contain?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
34)What are the main advantages and disadvantages of Electronic Codebook (ECB)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
29)____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
39)What are the main characteristics of AES?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
22)____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.
A) ASCII
B) ASN.1
C) PKCS
D) X.500
A) ASCII
B) ASN.1
C) PKCS
D) X.500
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
36)Describe the CBC rollover problem.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
28)____________________ is the assurance that an entity is who it claims to be.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
31)For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
35)What are the differences between dictionary and brute-force attacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
26)The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.
A) ASN.1
B) Base64
C) PKCS
D) OID
A) ASN.1
B) Base64
C) PKCS
D) OID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
33)Describe the main characteristics of symmetric key encryption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
38)Describe the meet-in-the-middle attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What is the format of a X.500 distinguished name?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck