The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)
True
New cards
2
Transport encryption is used to protect data that is ________.
In motion
New cards
3
Because TLS is based on SSL, they are interoperable, and thus TLS is sometimes referred to as SSL. (T/F)
False
New cards
4
Authentication is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information. (T/F)
False
New cards
5
What is the best way to thwart a known plaintext/ciphertext attack?
Use a large keyspace
New cards
6
Which term refers to an arranged group of algorithms?
cipher suite
New cards
7
By default, LDAP traffic is transmitted insecurely. (T/F)
True
New cards
8
Directory services use ________ as the primary protocol.
Lightweight Directory Access Protocol (LDAP)
New cards
9
Which term refers to protecting data from casual observation?
obfuscation
New cards
10
What is the best defense against rainbow table attacks?
Use salted hashes.
New cards
11
Integrity is the ability to keep some piece of data a secret. (T/F)
False
New cards
12
Which type of attack is designed to defeat proper key exchange by intercepting the remote party's key and replacing it with the attacker's key in both directions?
man-in-the-middle
New cards
13
Which method of encoding information into an image alters the actual visual image as little as possible?
using LSB (Least Significant Bit) encoding
New cards
14
Which term refers to the matching of a user to an account through previously shared credentials?
authentication
New cards
15
The ________ is a standard for managing devices on IP-based networks.
Simple Network Management Protocol version 3 (SNMPv3)
New cards
16
Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?
high-resiliency
New cards
17
Over time, ciphers can become vulnerable to attacks. (T/F)
True
New cards
18
A digital signature by itself can protect the contents of the message from interception. (T/F)
False
New cards
19
Which key stretching mechanism uses a key-derivation function designed to produce a key derived from a password?
Password-Based Key Derivation Function 2 (PBKDF2)
New cards
20
The most common form of authentication is the user ID and password combination. (T/F)
True
New cards
21
Message authentication codes are used to determine whether a message has changed during transmission. (T/F)
True
New cards
22
How is integrity provided?
using one-way hash functions and digital signatures