*Chapter 06 Quiz (ITN260) - Applied Cryptography

studied byStudied by 8 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)

1 / 21

flashcard set

Earn XP

Description and Tags

22 Terms

1

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)

True

New cards
2

Transport encryption is used to protect data that is ________.

In motion

New cards
3

Because TLS is based on SSL, they are interoperable, and thus TLS is sometimes referred to as SSL. (T/F)

False

New cards
4

Authentication is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information. (T/F)

False

New cards
5

What is the best way to thwart a known plaintext/ciphertext attack?

Use a large keyspace

New cards
6

Which term refers to an arranged group of algorithms?

cipher suite

New cards
7

By default, LDAP traffic is transmitted insecurely. (T/F)

True

New cards
8

Directory services use ________ as the primary protocol.

Lightweight Directory Access Protocol (LDAP)

New cards
9

Which term refers to protecting data from casual observation?

obfuscation

New cards
10

What is the best defense against rainbow table attacks?

Use salted hashes.

New cards
11

Integrity is the ability to keep some piece of data a secret. (T/F)

False

New cards
12

Which type of attack is designed to defeat proper key exchange by intercepting the remote party's key and replacing it with the attacker's key in both directions?

man-in-the-middle

New cards
13

Which method of encoding information into an image alters the actual visual image as little as possible?

using LSB (Least Significant Bit) encoding

New cards
14

Which term refers to the matching of a user to an account through previously shared credentials?

authentication

New cards
15

The ________ is a standard for managing devices on IP-based networks.

Simple Network Management Protocol version 3 (SNMPv3)

New cards
16

Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?

high-resiliency

New cards
17

Over time, ciphers can become vulnerable to attacks. (T/F)

True

New cards
18

A digital signature by itself can protect the contents of the message from interception. (T/F)

False

New cards
19

Which key stretching mechanism uses a key-derivation function designed to produce a key derived from a password?

Password-Based Key Derivation Function 2 (PBKDF2)

New cards
20

The most common form of authentication is the user ID and password combination. (T/F)

True

New cards
21

Message authentication codes are used to determine whether a message has changed during transmission. (T/F)

True

New cards
22

How is integrity provided?

using one-way hash functions and digital signatures

New cards

Explore top notes

note Note
studied byStudied by 19 people
107 days ago
5.0(2)
note Note
studied byStudied by 12 people
844 days ago
4.0(1)
note Note
studied byStudied by 31 people
831 days ago
5.0(1)
note Note
studied byStudied by 17 people
919 days ago
5.0(2)
note Note
studied byStudied by 28 people
35 days ago
5.0(2)
note Note
studied byStudied by 18 people
836 days ago
5.0(1)
note Note
studied byStudied by 12 people
770 days ago
5.0(1)
note Note
studied byStudied by 4337 people
646 days ago
5.0(6)

Explore top flashcards

flashcards Flashcard (123)
studied byStudied by 34 people
678 days ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 12 people
573 days ago
5.0(1)
flashcards Flashcard (82)
studied byStudied by 16 people
36 days ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 21 people
152 days ago
5.0(2)
flashcards Flashcard (30)
studied byStudied by 1 person
798 days ago
5.0(1)
flashcards Flashcard (223)
studied byStudied by 19 people
450 days ago
5.0(1)
flashcards Flashcard (65)
studied byStudied by 4 people
198 days ago
5.0(1)
flashcards Flashcard (87)
studied byStudied by 3 people
335 days ago
5.0(1)
robot