1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?
Self-Encrypting Drive (SED)
A storage device, like a hard disk drive (HDD) or solid-state drive (SSD), that automatically encrypts all data as it's written to the drive and decrypts it when read, without any user input or software intervention
Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?
Full Disk Encryption (FDE)
An MS Windows component that enables encryption of individual files is called:
Encrypting File System (EFS)
Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)
GNU Privacy Guard (GPG)
Pretty Good Privacy (PGP)
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
HTTPS
A network protocol that enables secure file transfer over SSH is known as:
SFTP
SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption.
False (FTPS is an extension of FTP that adds support for TLS/SSL encryption)
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:
SSH
Which part of IPsec provides authentication, integrity, and confidentiality?
ESP
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
VPN
Which protocol enables secure, real-time delivery of audio and video over an IP network?
Secure Real-time Transport Protocol (SRTP)
An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is known as:
CCMP
Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?
TLS
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).
False
Symmetric encryption = secret key encryption
Asymmetric encryption = also known as public key encryption, uses two different keys: a public key for encryption and a private key for decryption
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).
True
Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)
DHE
ECC
RSA
Which of the following algorithms do(es) not fall into the category of asymmetric encryption? (Select all that apply)
AES
DES
IDEA
RC4
The term "KEK" refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.
True
Key Encryption Key (KEK)
Which of the answers listed below refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?
IKE (Internet Key Exchange)
Which of the following answers refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?
Diffie-Hellman Key Exchange (DHE)
Which of the answers listed below refers to a solution designed to strengthen the security of session keys?
Perfect Forward Secrecy (PFS)
Which of the following answers refers to a cryptographic key exchange protocol that leverages ECC for enhanced security and efficiency?
ECDH (Elliptic Curve Diffie-Hellman)
What is the name of a public-key cryptosystem that leverages the mathematical properties of large prime numbers to facilitate secure key exchange, create digital signatures, and encrypt data?
RSA (Rivest-Shamir-Adleman)
Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?
Elliptic Curve Cryptography (ECC)
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES
Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?
IDEA
What is the recommended replacement for DES?
AES
An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.
True
Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?
XOR
Which of the following answers refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?
Cipher Block Chaining (CBC)
Which cipher mode transforms a block cipher into a stream cipher enabling the encryption of individual bits or bytes of data?
Cipher Feedback (CFB)
A block cipher mode that combines a unique counter with encryption key to generate a stream of pseudorandom data blocks which are then used for encrypting data is called:
CTM
Which of the block cipher modes listed below is the simplest/weakest and therefore not recommended for use?
Electronic Codebook (ECB)
Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?
GCM
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.
True
Which AES key length provides the highest level of security?
256-bit key