CTI Ch. 4 Quiz
something you are
a fingerprint scan
something you know
a password
something you have
a security key fob
a warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
deterrent
steganalysis
discovering that hidden information exists within a graphic file
steganography
hiding data within an audio file
what are three examples of administrative access controls? (choose three)
hiring practices policies and procedures background checks
which two terms are used to describe cipher keys? (choose two)
key space key length
obfuscation
making a message confusing so it is harder to understand
what term is used to describe the technology that replaces sensitive information with a nonsensitive version?
masking
which term describes the technology that protects software from unauthorized access or modification?
watermarking
which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
AES
which asymmetric algorithm provides an electronic key exchange method to share the secret key?
Deffie-Hellman
what cryptographic algorithm is used by the NSA and includes the used of elliptical curves for digital signature generation and key exchange?
ECC
which three protocols use asymmetric key algorithms?
Pretty Good Privacy (PGP) Secure Sockets Layer (SSL) Secure Shell (SSH)
what term is used to describe concealing data in another file such as graphic, audio, or other text file?
Steganography
what encryption algorithm uses one key to encrypt data and a different key to decrypt data?
asymmetric
which three processes are examples of logical access controls? (choose three)
biometrics to validate physical characteristics intrusion detection system (IDS) to watch for suspicious network activity firewalls to monitor traffic
which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?
block
social steganography
creating a message that says one thing to but means something else to a specific audience.
what is the term used to describe the science of making and breaking secret codes?
cryptology
what type of cipher encrypts plaintext one byte or one bit at a time?
stream
which three devices represent examples of physical access controls? (choose three)
swipe cards locks video cameras
what encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
symmetric
what is the name of the method in which letters are rearranged to create the chiphertext?
transposition