*Chapter 06 Quiz (ITN260) - Applied Cryptography

studied byStudied by 8 people
5.0(1)
Get a hint
Hint

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)

1 / 21

flashcard set

Earn XP

Description and Tags

22 Terms

1

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)

True

New cards
2

Transport encryption is used to protect data that is ________.

In motion

New cards
3

Because TLS is based on SSL, they are interoperable, and thus TLS is sometimes referred to as SSL. (T/F)

False

New cards
4

Authentication is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information. (T/F)

False

New cards
5

What is the best way to thwart a known plaintext/ciphertext attack?

Use a large keyspace

New cards
6

Which term refers to an arranged group of algorithms?

cipher suite

New cards
7

By default, LDAP traffic is transmitted insecurely. (T/F)

True

New cards
8

Directory services use ________ as the primary protocol.

Lightweight Directory Access Protocol (LDAP)

New cards
9

Which term refers to protecting data from casual observation?

obfuscation

New cards
10

What is the best defense against rainbow table attacks?

Use salted hashes.

New cards
11

Integrity is the ability to keep some piece of data a secret. (T/F)

False

New cards
12

Which type of attack is designed to defeat proper key exchange by intercepting the remote party's key and replacing it with the attacker's key in both directions?

man-in-the-middle

New cards
13

Which method of encoding information into an image alters the actual visual image as little as possible?

using LSB (Least Significant Bit) encoding

New cards
14

Which term refers to the matching of a user to an account through previously shared credentials?

authentication

New cards
15

The ________ is a standard for managing devices on IP-based networks.

Simple Network Management Protocol version 3 (SNMPv3)

New cards
16

Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?

high-resiliency

New cards
17

Over time, ciphers can become vulnerable to attacks. (T/F)

True

New cards
18

A digital signature by itself can protect the contents of the message from interception. (T/F)

False

New cards
19

Which key stretching mechanism uses a key-derivation function designed to produce a key derived from a password?

Password-Based Key Derivation Function 2 (PBKDF2)

New cards
20

The most common form of authentication is the user ID and password combination. (T/F)

True

New cards
21

Message authentication codes are used to determine whether a message has changed during transmission. (T/F)

True

New cards
22

How is integrity provided?

using one-way hash functions and digital signatures

New cards

Explore top notes

note Note
studied byStudied by 2220 people
... ago
4.7(3)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(2)
note Note
studied byStudied by 48 people
... ago
5.0(1)
note Note
studied byStudied by 452 people
... ago
5.0(3)
note Note
studied byStudied by 43 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
4.5(2)
note Note
studied byStudied by 23406 people
... ago
4.5(119)

Explore top flashcards

flashcards Flashcard (41)
studied byStudied by 2 people
... ago
4.0(1)
flashcards Flashcard (26)
studied byStudied by 173 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 3 people
... ago
5.0(1)
robot