CTI Ch. 4 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

something you are

a fingerprint scan

something you know

a password

something you have

a security key fob

a warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

steganalysis

discovering that hidden information exists within a graphic file

steganography

hiding data within an audio file

what are three examples of administrative access controls? (choose three)

hiring practices policies and procedures background checks

which two terms are used to describe cipher keys? (choose two)

key space key length

obfuscation

making a message confusing so it is harder to understand

what term is used to describe the technology that replaces sensitive information with a nonsensitive version?

masking

which term describes the technology that protects software from unauthorized access or modification?

watermarking

which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

AES

which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Deffie-Hellman

what cryptographic algorithm is used by the NSA and includes the used of elliptical curves for digital signature generation and key exchange?

ECC

which three protocols use asymmetric key algorithms?

Pretty Good Privacy (PGP) Secure Sockets Layer (SSL) Secure Shell (SSH)

what term is used to describe concealing data in another file such as graphic, audio, or other text file?

Steganography

what encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric

which three processes are examples of logical access controls? (choose three)

biometrics to validate physical characteristics intrusion detection system (IDS) to watch for suspicious network activity firewalls to monitor traffic

which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

social steganography

creating a message that says one thing to but means something else to a specific audience.

what is the term used to describe the science of making and breaking secret codes?

cryptology

what type of cipher encrypts plaintext one byte or one bit at a time?

stream

which three devices represent examples of physical access controls? (choose three)

swipe cards locks video cameras

what encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

symmetric

what is the name of the method in which letters are rearranged to create the chiphertext?

transposition


संबंधित स्टडी सेट्स

Oxygenation / gas exchanger scc 111 3rd quarter

View Set

fundementals of data communications

View Set

NUR 1275 Endocrine Prep U Questions

View Set

LS 7A week 2 (5.1 + 5.3 Questions)

View Set

Chapter 14: Assessing Skin, Hair, and Nails Prep U

View Set

(Ch. 4 - Nursing Delegation Book)

View Set