Network Security 1.0 Modules 15-17

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Which algorithm can ensure data integrity?

MD5

2
New cards

What is the keyspace of an encryption algorithm?

the set of all possible values used to generate a key

3
New cards

Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?

Private key from Alice

4
New cards

Which three security services are provided by digital signatures? (Choose three)

Guarantees data has not changed in transit

Provides data encryption

Authenticates the source

5
New cards

What is another name for confidentiality of information?

Privacy

6
New cards

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

7
New cards

What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

AES

8
New cards

In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding cipthertext?

meet-in-the-middle

9
New cards

Match the disciplines or roles to the descriptions

10
New cards

What technology supports asymmectric key encryption used in IPsec VPNs?

IKE

11
New cards

What are two symmectric encryption algorithms?

3DES

AES

12
New cards

Which two items are used in asymmectric encryption? (Choose two)

a private key

a public key

13
New cards

What are two properties of a cryptographic hash function? (Choose two)

The hash function is one way and irreversible

The output is a fixed length

14
New cards

Which statement describes asymmetric encryption algorithms?

They are relatively slow because they are based on difficult computational algorithms.

15
New cards

An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. IN which two cases might an organization use PKI applications to securely exchange information between users?

HTTPS web service

802.1x authentication

16
New cards

Two users must authenicated each other using digital certificates and a CA.

17
New cards

The following message was encrypted using a Ceasar cipher with a key of 2: fghgpf vjg ecuvng

defend the castle

18
New cards

In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?

from the root CA or another subordinate CA at a higher level

19
New cards

What is the purpose for the using digital signatures for code signing?

to verify the integrity of executable files downloaded from a vendor website

20
New cards

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

PKI certificates

21
New cards

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?

Integrity

22
New cards

What is an example of the one-time pad cipher?

RC4

23
New cards

A company is developing a security policy for secure communication. In the exchange of critical

Origin authentication

24
New cards

What is the purpose of digital certificate?

It authenticates a website and establishes a secure connection to exchange confidential data.