CryptographyWk1

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:14 PM on 1/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

What is the CIA triad

Confidentiality, Integrity, Avalability

2
New cards

What is the BEST definition of threat in accordance to the book

A potential violation of security

3
New cards

What is the BEST definition of attack in accordance with the book

Assault on a security system

4
New cards

What are the two main types of passive attacks according to the book

Eavesdropping, Release of message contents

5
New cards

What is the type of active attack in which one entity is pretending to be another

masquerade

6
New cards

What is the type of active attack in which someone modifies data between client and server

man in the middle

7
New cards

How many bits long is a block cipher usually

128

8
New cards

Which of the encryption types only uses one key

symmetric

9
New cards

Which of the encryption types uses two keys

asymmetric

10
New cards

What are the 3 major types of device security

firewall, IDS, IPS

11
New cards

What is the term in which it assures that a user, sender or receiver cannot deny an action that they took

nonrepudiation

12
New cards

What is traffic padding

inserting bits into gaps in a data stream to frustrate traffic analysis

13
New cards

What is notorization

The use of trusted 3rd party to assure certain properties of a data exchange

14
New cards

What are the 3 cryptographic algorithms

keyless, single key, two key

15
New cards

True or False: The emphasis in dealing with active attacks is on prevention rather then detection

False

16
New cards

Does a block or stream cipher process data bit by bit or byte by byte

stream

17
New cards

Does a block or stream cipher process data in chunks of usually 128 bits

block

18
New cards

______ is the protection of data from passive attacks

confidentiality

19
New cards

Data ______ ensures that data cannot be altered or destroyed

integrity

20
New cards

Which word best fits the definition: a branch of mathematics that deals with the transformation of data

cryptography

21
New cards

Which authentication service more commonly uses certificates

peer entity authentication

22
New cards

which authentication service more commonly uses a MAC or digital signature

data origin authentication

23
New cards

Data that is appended to existing data unit is known as a

digital signature

24
New cards

True or False: Authentication protocols and encryption protocols are examples of security mechanisms

True

25
New cards

True or False: Data origin authentication does not provide protection against the modification of data units

True

26
New cards

True or False: security services include access control, data confidentiality, and data integrity but do not include authentication

False

27
New cards

A _____ level breach in security could cause significant degradation in the mission but the organization can still perform its primary functions

Medium

28
New cards

The OSI security architecture contains Security services, Security attacks and what other component

Security mechanism

29
New cards

What are the 3 key components of computer security

Confidentiality, Integrity, Availability

30
New cards

Eavesdropping is which type of attack

passive

31
New cards

Confidentiality covers the regions data confidentiality and _____ (choose the best fit)

privacy

32
New cards

Integrity covers the regions data integrity and _____ (choose the best fit)

data authenticity

33
New cards

Authentication, Access control, Data confidentiality, Data Integrity, Nonrepudiation and Availability service are all examples of what

Security services

34
New cards

Of the following: Cryptographic algorithms, routing control, authentication exchange, traffic padding, nonrepudiation, notarization which of the following is NOT a security mechanism

nonrepudiation

35
New cards

Asymmetric encryption is affiliated with what key encryption

two-key

36
New cards

What does ISOC stand for

Internet society

37
New cards

What does ITU stand for

International telecommunication union

38
New cards

What does ISO stand for?

International Organization for standardization

39
New cards

What are the 2 major terms of network security

Communication, Device security

40
New cards

Does this definition match trust or trustworthiness better; A characteristic of an entity that reflects the degree to which the entity is deserving of trust.

trustworthiness