The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)
True
2
New cards
Transport encryption is used to protect data that is ________.
In motion
3
New cards
Because TLS is based on SSL, they are interoperable, and thus TLS is sometimes referred to as SSL. (T/F)
False
4
New cards
Authentication is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information. (T/F)
False
5
New cards
What is the best way to thwart a known plaintext/ciphertext attack?
Use a large keyspace
6
New cards
Which term refers to an arranged group of algorithms?
cipher suite
7
New cards
By default, LDAP traffic is transmitted insecurely. (T/F)
True
8
New cards
Directory services use ________ as the primary protocol.
Lightweight Directory Access Protocol (LDAP)
9
New cards
Which term refers to protecting data from casual observation?
obfuscation
10
New cards
What is the best defense against rainbow table attacks?
Use salted hashes.
11
New cards
Integrity is the ability to keep some piece of data a secret. (T/F)
False
12
New cards
Which type of attack is designed to defeat proper key exchange by intercepting the remote party's key and replacing it with the attacker's key in both directions?
man-in-the-middle
13
New cards
Which method of encoding information into an image alters the actual visual image as little as possible?
using LSB (Least Significant Bit) encoding
14
New cards
Which term refers to the matching of a user to an account through previously shared credentials?
authentication
15
New cards
The ________ is a standard for managing devices on IP-based networks.
Simple Network Management Protocol version 3 (SNMPv3)
16
New cards
Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?
high-resiliency
17
New cards
Over time, ciphers can become vulnerable to attacks. (T/F)
True
18
New cards
A digital signature by itself can protect the contents of the message from interception. (T/F)
False
19
New cards
Which key stretching mechanism uses a key-derivation function designed to produce a key derived from a password?
Password-Based Key Derivation Function 2 (PBKDF2)
20
New cards
The most common form of authentication is the user ID and password combination. (T/F)
True
21
New cards
Message authentication codes are used to determine whether a message has changed during transmission. (T/F)
True
22
New cards
How is integrity provided?
using one-way hash functions and digital signatures