Deck 5: Cryptography and Data Protection

Full screen (f)
exit full mode
Question
When you use the word ______it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
Use Space or
up arrow
down arrow
to flip the card.
Question
_______ means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Question
_______ of information means, only authorized users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
Question
This helps in identifying the origin of information and authentic user. This referred to here as __________

A)confidentiality
B)integrity
C)authenticity
D)availability
Question
Data ___________ is used to ensure confidentiality.

A)encryption
B)locking
C)decryption
D)backup
Question
What does OSI stand for in the OSI Security Architecure?

A)open system interface
B)open systems interconnections
C)open source initiative
D)open standard interconnections
Question
A company requires its users to change passwords every month. This improves the ________ of the network.

A)performance
B)reliability
C)security
D)none of the above
Question
The ________ is encrypted text.

A)cipher scricpt
B)cipher text
C)secret text
D)secret script
Question
What type of attack uses a fraudulent server with a relay address?

A)ntlm
B)mitm
C)netbios
D)smb
Question
Which is the largest disadvantage of the symmetric Encryption?

A)more complex and therefore more time-consuming calculations.
B)problem of the secure transmission of the secret key.
C)less secure encryption function.
D)isn\t used any more.
Question
In cryptography, what is cipher?

A)algorithm for performing encryption and decryption
B)encrypted message
C)both algorithm for performing encryption and decryption and encrypted message
D)decrypted message
Question
In asymmetric key cryptography, the private key is kept by __________

A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
Question
Which one of the following algorithm is not used in asymmetric-key cryptography?

A)rsa algorithm
B)diffie-hellman algorithm
C)electronic code book algorithm
D)dsa algorithm
Question
In cryptography, the order of the letters in a message is rearranged by __________

A)transpositional ciphers
B)substitution ciphers
C)both transpositional ciphers and substitution ciphers
D)quadratic ciphers
Question
What is data encryption standard (DES)?

A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Question
A asymmetric-key (or public key ) cipher uses

A)1 key
B)2 key
C)3 key
D)4 key
Question
In asymmetric key cryptography, the two keys e and d, have special relationship to

A)others
B)data
C)keys
D)each other
Question
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A)malware analysis
B)exploit writing
C)reverse engineering
D)cryptography
Question
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

A)malware analysis
B)cryptography
C)reverse engineering
D)exploit writing
Question
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

A)secret key
B)external programs
C)add-ons
D)secondary key
Question
Conventional cryptography is also known as _____________ or symmetric-key encryption.

A)secret-key
B)public key
C)protected key
D)primary key
Question
The procedure to add bits to the last block is termed as _________________

A)decryption
B)hashing
C)tuning
D)padding
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Cryptography and Data Protection
1
When you use the word ______it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
confidentiality
2
_______ means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
integrity
3
_______ of information means, only authorized users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
availability
4
This helps in identifying the origin of information and authentic user. This referred to here as __________

A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
Data ___________ is used to ensure confidentiality.

A)encryption
B)locking
C)decryption
D)backup
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
What does OSI stand for in the OSI Security Architecure?

A)open system interface
B)open systems interconnections
C)open source initiative
D)open standard interconnections
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
A company requires its users to change passwords every month. This improves the ________ of the network.

A)performance
B)reliability
C)security
D)none of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
The ________ is encrypted text.

A)cipher scricpt
B)cipher text
C)secret text
D)secret script
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
What type of attack uses a fraudulent server with a relay address?

A)ntlm
B)mitm
C)netbios
D)smb
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
Which is the largest disadvantage of the symmetric Encryption?

A)more complex and therefore more time-consuming calculations.
B)problem of the secure transmission of the secret key.
C)less secure encryption function.
D)isn\t used any more.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
In cryptography, what is cipher?

A)algorithm for performing encryption and decryption
B)encrypted message
C)both algorithm for performing encryption and decryption and encrypted message
D)decrypted message
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
In asymmetric key cryptography, the private key is kept by __________

A)sender
B)receiver
C)sender and receiver
D)all the connected devices to the network
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
Which one of the following algorithm is not used in asymmetric-key cryptography?

A)rsa algorithm
B)diffie-hellman algorithm
C)electronic code book algorithm
D)dsa algorithm
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
In cryptography, the order of the letters in a message is rearranged by __________

A)transpositional ciphers
B)substitution ciphers
C)both transpositional ciphers and substitution ciphers
D)quadratic ciphers
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
What is data encryption standard (DES)?

A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
A asymmetric-key (or public key ) cipher uses

A)1 key
B)2 key
C)3 key
D)4 key
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
In asymmetric key cryptography, the two keys e and d, have special relationship to

A)others
B)data
C)keys
D)each other
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A)malware analysis
B)exploit writing
C)reverse engineering
D)cryptography
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

A)malware analysis
B)cryptography
C)reverse engineering
D)exploit writing
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

A)secret key
B)external programs
C)add-ons
D)secondary key
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
Conventional cryptography is also known as _____________ or symmetric-key encryption.

A)secret-key
B)public key
C)protected key
D)primary key
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
The procedure to add bits to the last block is termed as _________________

A)decryption
B)hashing
C)tuning
D)padding
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 22 flashcards in this deck.