CIS 2337 - Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

_________________ is the use of special encoding to hide messages within other messages.

Steganography

Why is LSB encoding the preferred method for steganography>

It alters the picture the least amount possible.

What is the advantage of using a crypto module?

It performs operations and maintains the key material in a physical or logical boundary.

Why does ECC work well on low-power devices?

Less computational power is needed for a given key strength.

Transport Layer Security for HTTP uses what port to communicate?

80

The use of multiple nearly identical messages can lead to the _________________ cryptographic attack method.

Collision

Which is a joint set of security processes and standards used by approved laboratories to award an Evaluation Assurance Level (EAL) from EAL1 to EAL7?

Common Criteria

A _________________ is a software library that implements cryptographic functions.

Cryptographic Service Provider (CSP)

_________________ is a protocol used to secure DNS packets during transmission across a network.

DNSSEC

Which is a detailed standard for creating and implementing security policies?

ISO / IEC 27002

Which is used to strengthen passwords from brute-force attacks?

PBKDF2

_________________ is a popular encryption program that has the ability to encrypt and digitally sign e-mail and files.

Pretty Good Privacy (PGP)

The use of precomputed answers to a problem is called _________________.

Rainbow Tables

Reusing previous user input to bypass security is an example of a _________________ attack.

Replay

Which is a secure e-mail standard?

S / MIME

The _________________ is a network protocol for securely delivering audio and video over IP networks.

Secure Real-time Transport Protocol (SRTP)

A common encryption method designed to encrypt above the network layer, enabling secure sessions between hosts, is called _________________.

Secure Sockets Layer (SSL)

Transport Layer Security consists of which two protocols?

The TLS Record Protocol and TLS Handshake Protocol.

What makes a digitally signed message different from an encrypted message?

The digitally signed message has encryption protection for integrity and nonrepudiation.

Emails and their attachments can be secured using _________________.

Transport Encryption


Set pelajaran terkait

mastering a&p 2 ch. 25 group 4 modules 25.9-25.10 DSM

View Set

APWH, Unit 4 Test, My AP Practice

View Set

Astronomy 100g Midterm 2 & 3/ Final Flashcards (Lectures 12- 40)

View Set

Chapter 5.5 1,2,3,4, and 5.6 1,2 and 3

View Set

Les nombres de 0 à 100 (en français de France et en français de Suisse)

View Set