Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which encryption algorithms can be used to encrypt and decrypt data?
|
RC5
|
|
Secret Key encryption is also known as:
|
Symmetrical
|
|
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
|
RSA
|
|
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
|
Steganography
|
|
Each user has a pair of cryptographic keys---a public key and a private key. The main difference between a public key and a private key is that:
|
The private key is only used by the client and kept secret while the public key is available to all.
|
|
Which of the following is a well-studied block cipher based on DES and the LEAST secure algorithm?
|
LANMAN
|
|
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?
|
MD5
|
|
Which key is generally applied FIRST to a message digest to provide non-repudiation by use of asymmetric cryptography?
|
Private Key of the sender
|
|
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database. Which description is correct when a hashing algorithm generates the same hash for two different messages?
|
A collision occurred
|
|
If a large key size is used, which of the following encryption algorithm is fast and hard to break?
|
Symmetric
|
|
In order to encrypt credit card data, which will be the most secure algorithm with the least CPU utilization?
|
AES
|
|
Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?
|
Confidentiality
|
|
If properly used, the perfect encryption scheme that is considered to be unbreakable is:
|
One time pad
|
|
Which statement correctly describes the difference between a secure cipher and a secure hash?
|
A cipher can be reversed, a hash cannot.
|
|
In an unsecured network, which of the following allows for secure key exchange without a pre-shared key?
|
DH-ECC
|
|
Which of the following increases the collision resistance of a hash?
|
Salt
|
|
How many keys are utilized with asymmetric cryptography?
|
Two
|
|
Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
|
One way funtion
|
|
In an unsecured network, which of the following allows for secure key exchange without a pre-shared key?
|
DH-ECC
|
|
Which of the following is a form of security through obscurity that allows an attacker to manipulate files using the least significant bit(s) to secretly embed data?
|
steganography
|