*Chapter 06 Quiz (ITN260) - Applied Cryptography

studied byStudied by 8 people
5.0(1)
Get a hint
Hint

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)

1 / 21

flashcard set

Earn XP

Description and Tags

22 Terms

1

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts. (T/F)

True

New cards
2

Transport encryption is used to protect data that is ________.

In motion

New cards
3

Because TLS is based on SSL, they are interoperable, and thus TLS is sometimes referred to as SSL. (T/F)

False

New cards
4

Authentication is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (or receiving) the information. (T/F)

False

New cards
5

What is the best way to thwart a known plaintext/ciphertext attack?

Use a large keyspace

New cards
6

Which term refers to an arranged group of algorithms?

cipher suite

New cards
7

By default, LDAP traffic is transmitted insecurely. (T/F)

True

New cards
8

Directory services use ________ as the primary protocol.

Lightweight Directory Access Protocol (LDAP)

New cards
9

Which term refers to protecting data from casual observation?

obfuscation

New cards
10

What is the best defense against rainbow table attacks?

Use salted hashes.

New cards
11

Integrity is the ability to keep some piece of data a secret. (T/F)

False

New cards
12

Which type of attack is designed to defeat proper key exchange by intercepting the remote party's key and replacing it with the attacker's key in both directions?

man-in-the-middle

New cards
13

Which method of encoding information into an image alters the actual visual image as little as possible?

using LSB (Least Significant Bit) encoding

New cards
14

Which term refers to the matching of a user to an account through previously shared credentials?

authentication

New cards
15

The ________ is a standard for managing devices on IP-based networks.

Simple Network Management Protocol version 3 (SNMPv3)

New cards
16

Which type of systems are characterized by functions that have the ability to resume normal operational conditions after an external disruption?

high-resiliency

New cards
17

Over time, ciphers can become vulnerable to attacks. (T/F)

True

New cards
18

A digital signature by itself can protect the contents of the message from interception. (T/F)

False

New cards
19

Which key stretching mechanism uses a key-derivation function designed to produce a key derived from a password?

Password-Based Key Derivation Function 2 (PBKDF2)

New cards
20

The most common form of authentication is the user ID and password combination. (T/F)

True

New cards
21

Message authentication codes are used to determine whether a message has changed during transmission. (T/F)

True

New cards
22

How is integrity provided?

using one-way hash functions and digital signatures

New cards

Explore top notes

note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 628 people
Updated ... ago
4.9 Stars(9)

Explore top flashcards

flashcards Flashcard35 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard196 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard79 terms
studied byStudied by 120 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard39 terms
studied byStudied by 8 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard148 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 107 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard21 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard336 terms
studied byStudied by 197 people
Updated ... ago
5.0 Stars(1)