Deck 1: Introduction to Security Concepts

ملء الشاشة (f)
exit full mode
سؤال
2)Encryption always ensures data integrity.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
17)DSA was standardized as a federal information processing standard (____) called the digital signature standard (DSS).

A) FIPS-086
B) FIPS-112
C) FIPS-156
D) FIPS-186
سؤال
12)Symmetric key encryptions ensure confidentiality and data ____.

A) integrity
B) privacy
C) availability
D) repudiation
سؤال
4)DES is considered weak by today's standards due to the fact that the key size is only 56 bits.
سؤال
10)A(n) ____ uses a keystream composed of completely random digits.

A) XOR pad
B) block cipher
C) keystream cipher
D) one-time pad
سؤال
18)____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

A) Brute force
B) Dictionary attack
C) Meet-in-the-middle
D) Man-in-the-middle
سؤال
20)A digital certificate is standardized as ____ under IETF RFC 2459.

A) X.501
B) X.509
C) X.512
D) X.529
سؤال
6)A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.

A) IP address
B) ARP address
C) MAC address
D) DN
سؤال
13)Schemes that involve hashing with secret keys are called ____ or keyed hashes.

A) MACs
B) checksums
C) parity bits
D) parity keys
سؤال
1)A software system is only as secure as its weakest link.
سؤال
8)____ occurs when an attacker maliciously changes data in transit or in a medium.

A) Spoofing
B) Tampering
C) Replay attack
D) Snooping
سؤال
19)A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.

A) private key certificate
B) private key signature
C) public key signature
D) public key certificate
سؤال
7)In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.

A) tampering
B) snooping
C) sniffing
D) spoofing
سؤال
5)A common use for cryptographic hash functions is to provide password-storage solutions.
سؤال
16)____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.

A) 3DES-EDE
B) Digital signatures
C) Symmetric encryption
D) Block ciphers
سؤال
14)____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

A) Message authentication code
B) Digital certificate
C) Key agreement
D) Keyed hashes
سؤال
3)Parallel encryption is possible with a block cipher operating in CFB mode.
سؤال
11)____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.

A) RC4
B) RC5
C) DES
D) AES
سؤال
9)The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.

A) bit
B) character
C) block
D) byte
سؤال
15)The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.

A) RSA
B) ElGamal
C) Diffie-Hellman
D) discrete logarithm
سؤال
23)____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.

A) PKCS
B) OID
C) ASN.1
D) ASCII
سؤال
27)____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.
سؤال
25)____s are used for naming almost every object type in X.509 certificates such as components of distinguished names, extensions, and so on.

A) OID
B) ASN.1
C) PKCS
D) Base64
سؤال
24)____ encoding literally means a positional numbering system using a base of 64.

A) ASN.1
B) Base64
C) OID
D) PKCS#64
سؤال
40)What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?
سؤال
21)____ means people who know each other can securely send messages to their friends.

A) Certificate Authority
B) PKI
C) Web of trust
D) Digital ring
سؤال
30)A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.
سؤال
37)Describe a block cipher counter (CTR) mode of operation.
سؤال
41)What information does a certificate contain?
سؤال
34)What are the main advantages and disadvantages of Electronic Codebook (ECB)?
سؤال
29)____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.
سؤال
39)What are the main characteristics of AES?
سؤال
22)____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.

A) ASCII
B) ASN.1
C) PKCS
D) X.500
سؤال
36)Describe the CBC rollover problem.
سؤال
28)____________________ is the assurance that an entity is who it claims to be.
سؤال
31)For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.
سؤال
35)What are the differences between dictionary and brute-force attacks?
سؤال
26)The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.

A) ASN.1
B) Base64
C) PKCS
D) OID
سؤال
33)Describe the main characteristics of symmetric key encryption.
سؤال
38)Describe the meet-in-the-middle attack.
سؤال
Match between columns
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Digital signature algorithm (DSA)
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Replay attack
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Checksum
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Block cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Message digest
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Data origin authentication
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Stream cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Snooping
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Entity authentication
identifies a specific entity as the source or origin of a given piece of data
Digital signature algorithm (DSA)
identifies a specific entity as the source or origin of a given piece of data
Replay attack
identifies a specific entity as the source or origin of a given piece of data
Checksum
identifies a specific entity as the source or origin of a given piece of data
Block cipher
identifies a specific entity as the source or origin of a given piece of data
Message digest
identifies a specific entity as the source or origin of a given piece of data
Data origin authentication
identifies a specific entity as the source or origin of a given piece of data
Stream cipher
identifies a specific entity as the source or origin of a given piece of data
Snooping
identifies a specific entity as the source or origin of a given piece of data
Entity authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Digital signature algorithm (DSA)
takes the original data, divides it into digits, and encrypts each digit one at a time
Replay attack
takes the original data, divides it into digits, and encrypts each digit one at a time
Checksum
takes the original data, divides it into digits, and encrypts each digit one at a time
Block cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Message digest
takes the original data, divides it into digits, and encrypts each digit one at a time
Data origin authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Stream cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Snooping
takes the original data, divides it into digits, and encrypts each digit one at a time
Entity authentication
traditional technique for detecting if data inadvertently changes during transmission
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Replay attack
traditional technique for detecting if data inadvertently changes during transmission
Checksum
traditional technique for detecting if data inadvertently changes during transmission
Block cipher
traditional technique for detecting if data inadvertently changes during transmission
Message digest
traditional technique for detecting if data inadvertently changes during transmission
Data origin authentication
traditional technique for detecting if data inadvertently changes during transmission
Stream cipher
traditional technique for detecting if data inadvertently changes during transmission
Snooping
traditional technique for detecting if data inadvertently changes during transmission
Entity authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Digital signature algorithm (DSA)
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Replay attack
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Checksum
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Block cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Data origin authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Stream cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Snooping
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Digital signature algorithm (DSA)
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Replay attack
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Checksum
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Block cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Message digest
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Data origin authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Stream cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Snooping
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Entity authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Digital signature algorithm (DSA)
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Replay attack
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Checksum
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Block cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Message digest
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Data origin authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Stream cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Snooping
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Entity authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Digital signature algorithm (DSA)
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Replay attack
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Checksum
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Block cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Message digest
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Data origin authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Stream cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Snooping
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Entity authentication
a fixed-size checksum created by cryptographic hash functions
Digital signature algorithm (DSA)
a fixed-size checksum created by cryptographic hash functions
Replay attack
a fixed-size checksum created by cryptographic hash functions
Checksum
a fixed-size checksum created by cryptographic hash functions
Block cipher
a fixed-size checksum created by cryptographic hash functions
Message digest
a fixed-size checksum created by cryptographic hash functions
Data origin authentication
a fixed-size checksum created by cryptographic hash functions
Stream cipher
a fixed-size checksum created by cryptographic hash functions
Snooping
a fixed-size checksum created by cryptographic hash functions
Entity authentication
سؤال
What is the format of a X.500 distinguished name?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to Security Concepts
1
2)Encryption always ensures data integrity.
False
2
17)DSA was standardized as a federal information processing standard (____) called the digital signature standard (DSS).

A) FIPS-086
B) FIPS-112
C) FIPS-156
D) FIPS-186
D
3
12)Symmetric key encryptions ensure confidentiality and data ____.

A) integrity
B) privacy
C) availability
D) repudiation
B
4
4)DES is considered weak by today's standards due to the fact that the key size is only 56 bits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
10)A(n) ____ uses a keystream composed of completely random digits.

A) XOR pad
B) block cipher
C) keystream cipher
D) one-time pad
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
18)____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

A) Brute force
B) Dictionary attack
C) Meet-in-the-middle
D) Man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
20)A digital certificate is standardized as ____ under IETF RFC 2459.

A) X.501
B) X.509
C) X.512
D) X.529
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
6)A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.

A) IP address
B) ARP address
C) MAC address
D) DN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
13)Schemes that involve hashing with secret keys are called ____ or keyed hashes.

A) MACs
B) checksums
C) parity bits
D) parity keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
1)A software system is only as secure as its weakest link.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
8)____ occurs when an attacker maliciously changes data in transit or in a medium.

A) Spoofing
B) Tampering
C) Replay attack
D) Snooping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
19)A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.

A) private key certificate
B) private key signature
C) public key signature
D) public key certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
7)In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.

A) tampering
B) snooping
C) sniffing
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
5)A common use for cryptographic hash functions is to provide password-storage solutions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
16)____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.

A) 3DES-EDE
B) Digital signatures
C) Symmetric encryption
D) Block ciphers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
14)____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

A) Message authentication code
B) Digital certificate
C) Key agreement
D) Keyed hashes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
3)Parallel encryption is possible with a block cipher operating in CFB mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
11)____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.

A) RC4
B) RC5
C) DES
D) AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
9)The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.

A) bit
B) character
C) block
D) byte
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
15)The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.

A) RSA
B) ElGamal
C) Diffie-Hellman
D) discrete logarithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
23)____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.

A) PKCS
B) OID
C) ASN.1
D) ASCII
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
27)____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
25)____s are used for naming almost every object type in X.509 certificates such as components of distinguished names, extensions, and so on.

A) OID
B) ASN.1
C) PKCS
D) Base64
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
24)____ encoding literally means a positional numbering system using a base of 64.

A) ASN.1
B) Base64
C) OID
D) PKCS#64
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
40)What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
21)____ means people who know each other can securely send messages to their friends.

A) Certificate Authority
B) PKI
C) Web of trust
D) Digital ring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
30)A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
37)Describe a block cipher counter (CTR) mode of operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
41)What information does a certificate contain?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
34)What are the main advantages and disadvantages of Electronic Codebook (ECB)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
29)____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
39)What are the main characteristics of AES?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
22)____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.

A) ASCII
B) ASN.1
C) PKCS
D) X.500
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
36)Describe the CBC rollover problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
28)____________________ is the assurance that an entity is who it claims to be.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
31)For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
35)What are the differences between dictionary and brute-force attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
26)The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.

A) ASN.1
B) Base64
C) PKCS
D) OID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
33)Describe the main characteristics of symmetric key encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
38)Describe the meet-in-the-middle attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Digital signature algorithm (DSA)
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Replay attack
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Checksum
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Block cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Message digest
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Data origin authentication
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Stream cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Snooping
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Entity authentication
identifies a specific entity as the source or origin of a given piece of data
Digital signature algorithm (DSA)
identifies a specific entity as the source or origin of a given piece of data
Replay attack
identifies a specific entity as the source or origin of a given piece of data
Checksum
identifies a specific entity as the source or origin of a given piece of data
Block cipher
identifies a specific entity as the source or origin of a given piece of data
Message digest
identifies a specific entity as the source or origin of a given piece of data
Data origin authentication
identifies a specific entity as the source or origin of a given piece of data
Stream cipher
identifies a specific entity as the source or origin of a given piece of data
Snooping
identifies a specific entity as the source or origin of a given piece of data
Entity authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Digital signature algorithm (DSA)
takes the original data, divides it into digits, and encrypts each digit one at a time
Replay attack
takes the original data, divides it into digits, and encrypts each digit one at a time
Checksum
takes the original data, divides it into digits, and encrypts each digit one at a time
Block cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Message digest
takes the original data, divides it into digits, and encrypts each digit one at a time
Data origin authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Stream cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Snooping
takes the original data, divides it into digits, and encrypts each digit one at a time
Entity authentication
traditional technique for detecting if data inadvertently changes during transmission
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Replay attack
traditional technique for detecting if data inadvertently changes during transmission
Checksum
traditional technique for detecting if data inadvertently changes during transmission
Block cipher
traditional technique for detecting if data inadvertently changes during transmission
Message digest
traditional technique for detecting if data inadvertently changes during transmission
Data origin authentication
traditional technique for detecting if data inadvertently changes during transmission
Stream cipher
traditional technique for detecting if data inadvertently changes during transmission
Snooping
traditional technique for detecting if data inadvertently changes during transmission
Entity authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Digital signature algorithm (DSA)
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Replay attack
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Checksum
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Block cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Data origin authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Stream cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Snooping
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Digital signature algorithm (DSA)
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Replay attack
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Checksum
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Block cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Message digest
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Data origin authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Stream cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Snooping
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Entity authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Digital signature algorithm (DSA)
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Replay attack
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Checksum
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Block cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Message digest
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Data origin authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Stream cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Snooping
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Entity authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Digital signature algorithm (DSA)
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Replay attack
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Checksum
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Block cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Message digest
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Data origin authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Stream cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Snooping
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Entity authentication
a fixed-size checksum created by cryptographic hash functions
Digital signature algorithm (DSA)
a fixed-size checksum created by cryptographic hash functions
Replay attack
a fixed-size checksum created by cryptographic hash functions
Checksum
a fixed-size checksum created by cryptographic hash functions
Block cipher
a fixed-size checksum created by cryptographic hash functions
Message digest
a fixed-size checksum created by cryptographic hash functions
Data origin authentication
a fixed-size checksum created by cryptographic hash functions
Stream cipher
a fixed-size checksum created by cryptographic hash functions
Snooping
a fixed-size checksum created by cryptographic hash functions
Entity authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the format of a X.500 distinguished name?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.