Cybersecurity 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.

True

2
New cards

IPsec can only encrypt the packet data but not the header information.

False

3
New cards

L2TP uses IPsec for its encryption.

True

4
New cards

Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user’s machine.

True

5
New cards

A digital signature is used to guarantee who sent a message. This is referred to as non-repudiation.

True

6
New cards

Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.

True

7
New cards

PGP involves only private key encryption.

False

8
New cards

The most widely used symmetric key algorithm is Advanced Encryption Standard.

True

9
New cards

Cipher text is encrypted text.

True

10
New cards

Binary numbers are made up of 0s and 1s.

True

11
New cards

______________ is the process to scramble a message or other information so that it cannot be easily read.

Encryption

12
New cards

__________ is the art to write in or decipher secret code.

Cryptography

13
New cards

Which of these is NOT one of the two basic types of cryptography?

Forward

14
New cards

With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.

Key

15
New cards

Using the __________ cipher you choose some number by which to shift each letter of a text.

Caesar

16
New cards

Using the _________ cipher you select multiple numbers by which to shift letters.

Multi-alphabet substitution

17
New cards

Which of the following is an operation used on binary numbers not found in normal math?

AND

18
New cards

A(n) ________ refers to the bits that are combined with the plain text to encrypt it.

key

19
New cards

________ refers to unencrypted text.

plain text

20
New cards

__________refers to encrypted text.

cipher text

21
New cards

A(n) ___________is a set of steps for doing something.

Algorithm

22
New cards

Which of these is NOT a type of symmetric algorithm?

Transcription

23
New cards

_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.

Blowfish

24
New cards

With ______________ encryption, one key is used to encrypt a message, and another is used to decrypt the message.

Public key

25
New cards

Windows stores passwords using a method called _________

Hashing