Deck 9: Encryption - The Foundation for the Virtual Private Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
Play
Full screen (f)
Deck 9: Encryption - The Foundation for the Virtual Private Network
1
Rijndael is the block cipher algorithm behind what encryption standard?
A) AES
B) 3DES
C) DES
D) RSA
A) AES
B) 3DES
C) DES
D) RSA
A
2
Asymmetric encryption uses ____ separate keys for each message.
A) one
B) two
C) three
D) four
A) one
B) two
C) three
D) four
B
3
Historically, attempts to gain unauthorized access to secure communications have used brute force attacks.
True
4
One of the most popular public key cryptosystems is a proprietary model named ____.
A) Triple DES
B) Rijndael
C) Rivest-Shamir-Aldeman (RSA)
D) certificate authority (CA)
A) Triple DES
B) Rijndael
C) Rivest-Shamir-Aldeman (RSA)
D) certificate authority (CA)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
According to the computer insurance agency Safeware, Inc.(www.safeware.com), a laptop is stolen every ____.
A) second
B) 12 seconds
C) 5 minutes
D) 2 hours
A) second
B) 12 seconds
C) 5 minutes
D) 2 hours
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
Pure asymmetric key encryption is widely used except in the area of certificates.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
The XOR cipher conversion subjects the bitstream to a Boolean XOR function against some other data stream typically a ____ stream "
A) data
B) cipher
C) plaintext
D) key
A) data
B) cipher
C) plaintext
D) key
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
Pretty Good Privacy (PGP) provides security for ____.
A) banking
B) HTTP
C) e-mail
D) FTP
A) banking
B) HTTP
C) e-mail
D) FTP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ cipher rearranges the values within a block to create the ciphertext.
A) transposition
B) polyalphabetic substitution
C) Vernam
D) monoalphabetic substitution
A) transposition
B) polyalphabetic substitution
C) Vernam
D) monoalphabetic substitution
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
____ was developed by Netscape in 1994 to provide security for online electronic commerce transactions.
A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
The reverse of the asymmetric encryption process yields ____.
A) digital signatures
B) certificate authorities
C) DES
D) a Rijndael round
A) digital signatures
B) certificate authorities
C) DES
D) a Rijndael round
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
The replacement of one alphabet character with another from more than one alphabets is known as
A) polyalphabetic substitution
B) transposition cipher
C) Caesar cipher
D) monoaphabetic substitution
A) polyalphabetic substitution
B) transposition cipher
C) Caesar cipher
D) monoaphabetic substitution
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
____ was developed as an improvement to DES and uses as many as three keys in succession.
A) Triple DES
B) AES
C) Vernam
D) Rijndael
A) Triple DES
B) AES
C) Vernam
D) Rijndael
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
Text that has been encrypted is called ____.
A) ciphertext
B) plaintext
C) cryptotext
D) cryptography
A) ciphertext
B) plaintext
C) cryptotext
D) cryptography
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
The formula ____ represents the application of encryption (E) to a message (M) to create ciphertext (C)
A) E(C) = M
B) E(M) = C
C) E*C = M
D) M = E?C
A) E(C) = M
B) E(M) = C
C) E*C = M
D) M = E?C
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
Firewalls have always performed encryption-related functions.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
____ is the process of deciphering the original message from an encrypted message without knowing the algorithms and keys used to perform the encryption.
A) Nonrepudiation
B) Cryptography
C) Cryptanalysis
D) Cryptology
A) Nonrepudiation
B) Cryptography
C) Cryptanalysis
D) Cryptology
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
AES has been the federally approved standard for nonclassified data since 2002.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
The process of assuring that parties to a transaction are authentic, so that they cannot later deny having participated is called repudiation.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
MasterCard and VISA developed ____ in 1997.
A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
A) Secure Hypertext Transfer Protocol (SHTTP)
B) Secure Shell (SSH)
C) Secure Sockets Layer (SSL)
D) Secure Electronic Transactions (SET)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
What are three commonly used functions used by encryption algorithms?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.
A) man-in-the-middle
B) timing
C) known-plaintext
D) selected-plaintext
A) man-in-the-middle
B) timing
C) known-plaintext
D) selected-plaintext
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The set of transformations necessary to convert an unencrypted message into an encrypted message.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The set of transformations necessary to convert an unencrypted message into an encrypted message.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
In ____________________ cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
In e-commerce, some cryptographic tools can be used to assure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction, a feature often called ____________________.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
Session ____________________ are attacks involving a communication session that has already been established between a server and a client.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
PKI systems are based on public key cryptosystems and include digital certificates and certificate ____________________.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To decrypt or convert ciphertext to plaintext.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To decrypt or convert ciphertext to plaintext.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
____ attacks can be successful when the ciphertext consists of relatively few characters.
A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
____ attacks are collections of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
A) Correlation
B) Man-in-the-middle
C) Dictionary
D) Timing
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
Define encryption.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To encrypt or convert plaintext to ciphertext.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
To encrypt or convert plaintext to ciphertext.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The encrypted or encoded message resulting from an encryption.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The encrypted or encoded message resulting from an encryption.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
____ is a Kerberos service that generates and issues session keys.
A) IP Security (IPSec)
B) Kerberos Ticket Granting Service (TGS)
C) Key Distribution Center (KDC)
D) Authentication Server (AS)
A) IP Security (IPSec)
B) Kerberos Ticket Granting Service (TGS)
C) Key Distribution Center (KDC)
D) Authentication Server (AS)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The information used in conjunction with the algorithm to create the ciphertext from the plaintext.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The information used in conjunction with the algorithm to create the ciphertext from the plaintext.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The entire range of values that can possibly be used to construct an individual key.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The entire range of values that can possibly be used to construct an individual key.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The mathematical formula or method used to convert an unencrypted message into an encrypted message or vice versa.
a.cipher
b.keyspace
c.encipher
d.cryptosystem
e.ciphertext
f.work factor
g.decipher
h.algorithm
i.cryptovariable
The mathematical formula or method used to convert an unencrypted message into an encrypted message or vice versa.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
____ is the predominant cryptographic authentication and encryption protocol suite in use today.
A) Secure Hypertext Transfer Protocol (SHTTP)
B) Public key infrastructure (PKI)
C) Privacy Enhanced Mail (PEM)
D) IP Security (IPSec)
A) Secure Hypertext Transfer Protocol (SHTTP)
B) Public key infrastructure (PKI)
C) Privacy Enhanced Mail (PEM)
D) IP Security (IPSec)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
What is a timing attack?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
Describe some of the common protocols used to secure e-mail.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
Describe some of the challenges that organizations face when it comes to cryptographic controls.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
What is a Vernam cipher?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
What is a man-in-the-middle attack?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
Describe asymmetric encryption.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
What are common implementations of PKI?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
Describe symmetric encryption.What is the weakness of this type of encryption?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck