Deck 9: Encryption - The Foundation for the Virtual Private Network

Full screen (f)
exit full mode
Question
Rijndael is the block cipher algorithm behind what encryption standard?

A) AES
B) 3DES
C) DES
D) RSA
Use Space or
up arrow
down arrow
to flip the card.
Question
Asymmetric encryption uses ____ separate keys for each message.

A) one
B) two
C) three
D) four
Question
Historically, attempts to gain unauthorized access to secure communications have used brute force attacks.
Question
One of the most popular public key cryptosystems is a proprietary model named ____.

A) Triple DES
B) Rijndael
C) Rivest-Shamir-Aldeman (RSA)
D) certificate authority (CA)
Question
According to the computer insurance agency Safeware, Inc.(www.safeware.com), a laptop is stolen every ____.

A) second
B) 12 seconds
C) 5 minutes
D) 2 hours
Question
Pure asymmetric key encryption is widely used except in the area of certificates.
Question
The XOR cipher conversion subjects the bitstream to a Boolean XOR function against some other data stream typically a ____ stream "

A) data
B) cipher
C) plaintext
D) key
Question
Pretty Good Privacy (PGP) provides security for ____.

A) banking
B) HTTP
C) e-mail
D) FTP
Question
The ____ cipher rearranges the values within a block to create the ciphertext.

A) transposition
B) polyalphabetic substitution
C) Vernam
D) monoalphabetic substitution
Question
____ was developed by Netscape in 1994 to provide security for online electronic commerce transactions.

A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
Question
The reverse of the asymmetric encryption process yields ____.

A) digital signatures
B) certificate authorities
C) DES
D) a Rijndael round
Question
The replacement of one alphabet character with another from more than one alphabets is known as

A) polyalphabetic substitution
B) transposition cipher
C) Caesar cipher
D) monoaphabetic substitution
Question
____ was developed as an improvement to DES and uses as many as three keys in succession.

A) Triple DES
B) AES
C) Vernam
D) Rijndael
Question
Text that has been encrypted is called ____.

A) ciphertext
B) plaintext
C) cryptotext
D) cryptography
Question
The formula ____ represents the application of encryption (E) to a message (M) to create ciphertext (C)

A) E(C) = M
B) E(M) = C
C) E*C = M
D) M = E?C
Question
Firewalls have always performed encryption-related functions.
Question
____ is the process of deciphering the original message from an encrypted message without knowing the algorithms and keys used to perform the encryption.

A) Nonrepudiation
B) Cryptography
C) Cryptanalysis
D) Cryptology
Question
AES has been the federally approved standard for nonclassified data since 2002.
Question
The process of assuring that parties to a transaction are authentic, so that they cannot later deny having participated is called repudiation.
Question
MasterCard and VISA developed ____ in 1997.

A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
Question
What are three commonly used functions used by encryption algorithms?
Question
An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.

A) man-in-the-middle
B) timing
C) known-plaintext
D) selected-plaintext
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The set of transformations necessary to convert an unencrypted message into an encrypted message.
Question
In ____________________ cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream.
Question
In e-commerce, some cryptographic tools can be used to assure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction, a feature often called ____________________.
Question
Session ____________________ are attacks involving a communication session that has already been established between a server and a client.
Question
PKI systems are based on public key cryptosystems and include digital certificates and certificate ____________________.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To decrypt or convert ciphertext to plaintext.
Question
____ attacks can be successful when the ciphertext consists of relatively few characters.

A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
Question
____ attacks are collections of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.

A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
Question
Define encryption.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To encrypt or convert plaintext to ciphertext.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The encrypted or encoded message resulting from an encryption.
Question
____ is a Kerberos service that generates and issues session keys.

A) IP Security (IPSec)
B) Kerberos Ticket Granting Service (TGS)
C) Key Distribution Center (KDC)
D) Authentication Server (AS)
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The information used in conjunction with the algorithm to create the ciphertext from the plaintext.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The entire range of values that can possibly be used to construct an individual key.
Question
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The mathematical formula or method used to convert an unencrypted message into an encrypted message or vice versa.
Question
____ is the predominant cryptographic authentication and encryption protocol suite in use today.

A) Secure Hypertext Transfer Protocol (SHTTP)
B) Public key infrastructure (PKI)
C) Privacy Enhanced Mail (PEM)
D) IP Security (IPSec)
Question
What is a timing attack?
Question
Describe some of the common protocols used to secure e-mail.
Question
Describe some of the challenges that organizations face when it comes to cryptographic controls.
Question
What is a Vernam cipher?
Question
What is a man-in-the-middle attack?
Question
Describe asymmetric encryption.
Question
What are common implementations of PKI?
Question
Describe symmetric encryption.What is the weakness of this type of encryption?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Encryption - The Foundation for the Virtual Private Network
1
Rijndael is the block cipher algorithm behind what encryption standard?

A) AES
B) 3DES
C) DES
D) RSA
A
2
Asymmetric encryption uses ____ separate keys for each message.

A) one
B) two
C) three
D) four
B
3
Historically, attempts to gain unauthorized access to secure communications have used brute force attacks.
True
4
One of the most popular public key cryptosystems is a proprietary model named ____.

A) Triple DES
B) Rijndael
C) Rivest-Shamir-Aldeman (RSA)
D) certificate authority (CA)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
According to the computer insurance agency Safeware, Inc.(www.safeware.com), a laptop is stolen every ____.

A) second
B) 12 seconds
C) 5 minutes
D) 2 hours
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
Pure asymmetric key encryption is widely used except in the area of certificates.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
The XOR cipher conversion subjects the bitstream to a Boolean XOR function against some other data stream typically a ____ stream "

A) data
B) cipher
C) plaintext
D) key
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
Pretty Good Privacy (PGP) provides security for ____.

A) banking
B) HTTP
C) e-mail
D) FTP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ cipher rearranges the values within a block to create the ciphertext.

A) transposition
B) polyalphabetic substitution
C) Vernam
D) monoalphabetic substitution
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
____ was developed by Netscape in 1994 to provide security for online electronic commerce transactions.

A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
The reverse of the asymmetric encryption process yields ____.

A) digital signatures
B) certificate authorities
C) DES
D) a Rijndael round
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
The replacement of one alphabet character with another from more than one alphabets is known as

A) polyalphabetic substitution
B) transposition cipher
C) Caesar cipher
D) monoaphabetic substitution
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
____ was developed as an improvement to DES and uses as many as three keys in succession.

A) Triple DES
B) AES
C) Vernam
D) Rijndael
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
Text that has been encrypted is called ____.

A) ciphertext
B) plaintext
C) cryptotext
D) cryptography
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
The formula ____ represents the application of encryption (E) to a message (M) to create ciphertext (C)

A) E(C) = M
B) E(M) = C
C) E*C = M
D) M = E?C
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
Firewalls have always performed encryption-related functions.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
____ is the process of deciphering the original message from an encrypted message without knowing the algorithms and keys used to perform the encryption.

A) Nonrepudiation
B) Cryptography
C) Cryptanalysis
D) Cryptology
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
AES has been the federally approved standard for nonclassified data since 2002.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
The process of assuring that parties to a transaction are authentic, so that they cannot later deny having participated is called repudiation.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
MasterCard and VISA developed ____ in 1997.

A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
What are three commonly used functions used by encryption algorithms?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.

A) man-in-the-middle
B) timing
C) known-plaintext
D) selected-plaintext
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The set of transformations necessary to convert an unencrypted message into an encrypted message.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
In ____________________ cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
In e-commerce, some cryptographic tools can be used to assure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction, a feature often called ____________________.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
Session ____________________ are attacks involving a communication session that has already been established between a server and a client.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
PKI systems are based on public key cryptosystems and include digital certificates and certificate ____________________.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To decrypt or convert ciphertext to plaintext.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
____ attacks can be successful when the ciphertext consists of relatively few characters.

A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
____ attacks are collections of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.

A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
Define encryption.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To encrypt or convert plaintext to ciphertext.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The encrypted or encoded message resulting from an encryption.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
____ is a Kerberos service that generates and issues session keys.

A) IP Security (IPSec)
B) Kerberos Ticket Granting Service (TGS)
C) Key Distribution Center (KDC)
D) Authentication Server (AS)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The information used in conjunction with the algorithm to create the ciphertext from the plaintext.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The entire range of values that can possibly be used to construct an individual key.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The mathematical formula or method used to convert an unencrypted message into an encrypted message or vice versa.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
____ is the predominant cryptographic authentication and encryption protocol suite in use today.

A) Secure Hypertext Transfer Protocol (SHTTP)
B) Public key infrastructure (PKI)
C) Privacy Enhanced Mail (PEM)
D) IP Security (IPSec)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
What is a timing attack?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
Describe some of the common protocols used to secure e-mail.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
Describe some of the challenges that organizations face when it comes to cryptographic controls.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
What is a Vernam cipher?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
What is a man-in-the-middle attack?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
Describe asymmetric encryption.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
What are common implementations of PKI?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
Describe symmetric encryption.What is the weakness of this type of encryption?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 48 flashcards in this deck.