1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.
True
IPsec can only encrypt the packet data but not the header information.
False
L2TP uses IPsec for its encryption.
True
Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user’s machine.
True
A digital signature is used to guarantee who sent a message. This is referred to as non-repudiation.
True
Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.
True
PGP involves only private key encryption.
False
The most widely used symmetric key algorithm is Advanced Encryption Standard.
True
Cipher text is encrypted text.
True
Binary numbers are made up of 0s and 1s.
True
______________ is the process to scramble a message or other information so that it cannot be easily read.
Encryption
__________ is the art to write in or decipher secret code.
Cryptography
Which of these is NOT one of the two basic types of cryptography?
Forward
With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.
Key
Using the __________ cipher you choose some number by which to shift each letter of a text.
Caesar
Using the _________ cipher you select multiple numbers by which to shift letters.
Multi-alphabet substitution
Which of the following is an operation used on binary numbers not found in normal math?
AND
A(n) ________ refers to the bits that are combined with the plain text to encrypt it.
key
________ refers to unencrypted text.
plain text
__________refers to encrypted text.
cipher text
A(n) ___________is a set of steps for doing something.
Algorithm
Which of these is NOT a type of symmetric algorithm?
Transcription
_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.
Blowfish
With ______________ encryption, one key is used to encrypt a message, and another is used to decrypt the message.
Public key
Windows stores passwords using a method called _________
Hashing