Ethical Hacking Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

X.509

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate

certificate

A digital document that verifies that two parties exchanging data over the internet are really who they claim to be

key

A sequence of random bits generated from a range of allowable values

PKI

A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet

False

AES uses a 128-bit key and is used in PGP encryption software

True

Asymmetric algorithms are more scalable that symmetric algorithms

ciphertext

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted

symmetric

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm

True

ECC is an efficient algorithm requiring few hardware resources, so it's perfect candidate for wireless devices and cell phones

DEA

Encryption algorithm used for the Data Encryption Standard

cryptanalysis

If a security professional decides to study the process of breaking encryption algorithms, they are performing what

ciphertext-only

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the sae encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data

chosen-ciphertext

In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results

stream cipher

Operates on plaintext one bit at a time

salt

The use of random data alongside plaintext as an input to a hashing function so that the output is unique

hashing algorithm

Used for verification, takes a variable-length input and converts it to a fixed-length output string

birthday attacks

Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm

symmetric algorithm

Uses a single key to encrypt and decrypt data

asymmetric algorithm

Uses two keys: one to encrypt data and one to decrypt data

L0phtcrack

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength

RSA

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce

ECC

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves

brute force

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters

known plaintext

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms

SSL/TLS downgrade attack

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher

chosen-plaintext

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt

substitution cipher

What type of cryptography is demonstrated be reversing the alphabet so A becomes Z, B becomes Y, and so on

cryptosystem

What type of system converts between plaintext and ciphertext

dictionary

When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing

Nonrepudiation

Which function ensures that a sender and receiver cannot deny sending or receiving a specific message

AES-256

Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is valid strong enough to protect classified data

hashing algorithm

Which of the following is a function that takes a variable-length string or message and produces a fixed-length message digest

encryption key

Which of the following is a mathematical function or program that works with a key?

Keyspace

Which of the following is a range of allowable values that is used to generate an encryption key

EXPECT

Which of the following is a scripting language for Windows ans Linux performs repetitive tasks, such s password cracking

decryption

Which of the following is the process of converting ciphertext back into plaintext?

Authentication

Which of the following refers to verifying the sender or receiver (or both) is who they claim to be

stream cipher

Which type of symmetric algorithm operates on plaintext one bit at a time

True

Symmetric algorithms support confidentiality, but not authentication and nonrepudiation

False

Symmetric algorithms use two keys that are mathematically related


Set pelajaran terkait

All chapters quizzes & some warm ups

View Set

NURS 300 exam 5 practice questions

View Set

MBA Vocab - Oxford Examples - Vol 3

View Set

Business Law - Vogel, Unit iv quiz, Vogel Business Law Test 4, TCU BLaw Vogel Final, Business Law TCU Vogel Unit IV, Business Law Midterm, business law chapter 17, Business Law Chapter 18 - Vogel TCU, Business Law Chapter 19 - Vogel TCU, Business Law...

View Set