The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)
True
Transport encryption is used to protect data that is ________.
In motion
Because TLS is based on SSL, they are interoperable, and thus TLS is sometimes referred to as SSL. (T/F)
False
Authentication is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information. (T/F)
False
What is the best way to thwart a known plaintext/ciphertext attack?
Use a large keyspace
Which term refers to an arranged group of algorithms?
cipher suite
By default, LDAP traffic is transmitted insecurely. (T/F)
True
Directory services use ________ as the primary protocol.
Lightweight Directory Access Protocol (LDAP)
Which term refers to protecting data from casual observation?
obfuscation
What is the best defense against rainbow table attacks?
Use salted hashes.
Integrity is the ability to keep some piece of data a secret. (T/F)
False
Which type of attack is designed to defeat proper key exchange by intercepting the remote party's key and replacing it with the attacker's key in both directions?
man-in-the-middle
Which method of encoding information into an image alters the actual visual image as little as possible?
using LSB (Least Significant Bit) encoding
Which term refers to the matching of a user to an account through previously shared credentials?
authentication
The ________ is a standard for managing devices on IP-based networks.
Simple Network Management Protocol version 3 (SNMPv3)
Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?
high-resiliency
Over time, ciphers can become vulnerable to attacks. (T/F)
True
A digital signature by itself can protect the contents of the message from interception. (T/F)
False
Which key stretching mechanism uses a key-derivation function designed to produce a key derived from a password?
Password-Based Key Derivation Function 2 (PBKDF2)
The most common form of authentication is the user ID and password combination. (T/F)
True
Message authentication codes are used to determine whether a message has changed during transmission. (T/F)
True
How is integrity provided?
using one-way hash functions and digital signatures