CIS 2337 - Chapter 6
_________________ is the use of special encoding to hide messages within other messages.
Steganography
Why is LSB encoding the preferred method for steganography>
It alters the picture the least amount possible.
What is the advantage of using a crypto module?
It performs operations and maintains the key material in a physical or logical boundary.
Why does ECC work well on low-power devices?
Less computational power is needed for a given key strength.
Transport Layer Security for HTTP uses what port to communicate?
80
The use of multiple nearly identical messages can lead to the _________________ cryptographic attack method.
Collision
Which is a joint set of security processes and standards used by approved laboratories to award an Evaluation Assurance Level (EAL) from EAL1 to EAL7?
Common Criteria
A _________________ is a software library that implements cryptographic functions.
Cryptographic Service Provider (CSP)
_________________ is a protocol used to secure DNS packets during transmission across a network.
DNSSEC
Which is a detailed standard for creating and implementing security policies?
ISO / IEC 27002
Which is used to strengthen passwords from brute-force attacks?
PBKDF2
_________________ is a popular encryption program that has the ability to encrypt and digitally sign e-mail and files.
Pretty Good Privacy (PGP)
The use of precomputed answers to a problem is called _________________.
Rainbow Tables
Reusing previous user input to bypass security is an example of a _________________ attack.
Replay
Which is a secure e-mail standard?
S / MIME
The _________________ is a network protocol for securely delivering audio and video over IP networks.
Secure Real-time Transport Protocol (SRTP)
A common encryption method designed to encrypt above the network layer, enabling secure sessions between hosts, is called _________________.
Secure Sockets Layer (SSL)
Transport Layer Security consists of which two protocols?
The TLS Record Protocol and TLS Handshake Protocol.
What makes a digitally signed message different from an encrypted message?
The digitally signed message has encryption protection for integrity and nonrepudiation.
Emails and their attachments can be secured using _________________.
Transport Encryption