Charter 4: Security 284

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

masking Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

What are three examples of administrative access controls? (Choose three.)

1. hiring practices 2. policies and procedures 3. background checks Administrative access controls are defined by organizations to implement and enforce all aspects of controlling unauthorized access and include the following: Policies Procedures Hiring practices Background checks Data classification Security training Reviews

Which two terms are used to describe cipher keys? (Choose two.)

1. key space 2. key length

Which three devices represent examples of physical access controls? (Choose three.)

1. swipe cards 2. locks 3. video cameras Physical access controls include but are not limited to the following:Guards Fences Motion detectors Laptop locks Locked doors Swipe cards Guard dogs Video cameras Mantraps Alarms

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.

Which three protocols use asymmetric key algorithms? (Choose three.)

1. Secure Shell (SSH) 2. Pretty Good Privacy (PGP) 3. Secure Sockets Layer (SSL) Four protocols use asymmetric key algorithms: Internet Key Exchange (IKE) Secure Socket Layer (SSL) Secure Shell (SSH) Pretty Good Privacy (PGP)

Match the type of multifactor authentication with the description.

1. a security key fob ————> something you have 2. a fingerprint scan ————> something you are 3. a password ————> something you know Multi-factor authentication uses a minimum of two methods of verification and can include the following: Something you have Something you know Something you are

Which three processes are examples of logical access controls? (Choose three.)

1. firewalls to monitor traffic 2. intrusion detection system (IDS) to watch for suspicious network activity 3. biometrics to validate physical characteristics Logical access controls includes but is not limited to the following: Encryption Smart cards Passwords Biometrics Access Control Lists (ACLs) Protocols Firewalls Intrusion Detection Systems (IDS)

Which term describes the technology that protects software from unauthorized access or modification?

watermarking Software watermarking inserts a secret message into the program as proof of ownership and protects software from unauthorized access or modification.

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

AES The Advanced Encryption Standard (AES) is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths.

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple secure protocols.

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature generation and key exchange.

Match the description with the correct term. (Not all targets are used.)

Match the description with the correct term. (Not all targets are used.) 1. steganography —————> hiding data within an audio file 2. steganalysis ——————> discovering that hidden information exists within a graphic file 3. social steganography ——-> creating a message that says one thing but means something else to a specific audience 4. obfuscation ——————> making a message confusing so it is harder to understand

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the ciphertext, the same secret key to encrypt is used in reverse.

What is the term used to describe the science of making and breaking secret codes?

cryptology Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily compromise protected information.

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

steganography Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent extra attention to the encrypted data because the data is not easily viewed.

What type of cipher encrypts plaintext one byte or one bit at a time?

stream Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block ciphers.

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

symmetric Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.

What is the name of the method in which letters are rearranged to create the ciphertext?

transposition Explanation: Ciphertext can be created by using the following: Transposition - letters are rearranged Substitution - letters are replaced One-time pad - plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext


Set pelajaran terkait

NY Real Estate Chapter 3.B: Legal Issues - Liens & Easements

View Set

Galvanize Test Prep's HARD GRE Word List #11

View Set

Chapter 11 - Project Risk Management

View Set

Phrases, Clauses, Sentence Structure

View Set

Management: Business & Society. Ethics

View Set

VSim Charlie Snow Core Pre/Post Sim

View Set