Ch4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

What are three examples of administrative access controls? (Choose three.)

- Policies and procedures -Hiring practices -Background checks

Which three processes are examples of logical access controls? (Choose three.)

-Firewalls -Intrusion Detection Systems -Biometrics to validate physical characteristics

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

masking

Which term describes the technology that protects software from unauthorized access or modification?

watermarking

Which two terms are used to describe cipher keys? (Choose two.)

Key length Key space

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

AES

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

Which three protocols use asymmetric key algorithms? (Choose four.)

SSL, SSH, PGP, IKE

Match the type of multifactor authentication with the description.

Security fob = something you have Fingerprint scan = something you are Password = something you know

Match the description with the correct term. (Not all targets are used.)

Steganography - hiding data within an audio file Steganalysis - discovering there is hidden information Social steganography - creating a message that means something specific to certain people Obfuscation - making a message harder to understand

Which three devices represent examples of physical access controls? (Choose three.

Swipe cards Video cameras Locks

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

What is the term used to describe the science of making and breaking secret codes?

cryptology

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

steganography

What type of cipher encrypts plaintext one byte or one bit at a time?

stream

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

symmetric

What is the name of the method in which letters are rearranged to create the ciphertext?

transposition


Ensembles d'études connexes

English- Catcher in the Rye Test + Vocab

View Set

Ch. 12- The Evolution of Social Behavior

View Set

Chapter 11. Facebook: Platforms, Privacy, and Big Business from the Social Graph

View Set

Unit 13 - Asset Allocation and Modern Portfolio Theory

View Set

MCN lab mod 13 - Scopes and Standards

View Set

Understanding Business Chapter A

View Set

English tone, voice, mood and point-of-view

View Set