Encryption Quiz

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?

Self-Encrypting Drive (SED)

  • A storage device, like a hard disk drive (HDD) or solid-state drive (SSD), that automatically encrypts all data as it's written to the drive and decrypts it when read, without any user input or software intervention

2
New cards

Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?

Full Disk Encryption (FDE)

3
New cards

An MS Windows component that enables encryption of individual files is called:

Encrypting File System (EFS)

4
New cards

Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)

  • GNU Privacy Guard (GPG)

  • Pretty Good Privacy (PGP)

5
New cards

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

HTTPS

6
New cards

A network protocol that enables secure file transfer over SSH is known as:

SFTP

7
New cards

SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption.

False (FTPS is an extension of FTP that adds support for TLS/SSL encryption)

8
New cards

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:

SSH

9
New cards

Which part of IPsec provides authentication, integrity, and confidentiality?

ESP

10
New cards

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

VPN

11
New cards

Which protocol enables secure, real-time delivery of audio and video over an IP network?

Secure Real-time Transport Protocol (SRTP)

12
New cards

 An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is known as:

CCMP

13
New cards

Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?

TLS

14
New cards

Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).

 False

  • Symmetric encryption = secret key encryption

  • Asymmetric encryption = also known as public key encryption, uses two different keys: a public key for encryption and a private key for decryption

15
New cards

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).

 True

16
New cards

Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)

  • DHE

  • ECC

  • RSA

17
New cards

Which of the following algorithms do(es) not fall into the category of asymmetric encryption? (Select all that apply)

  • AES

  • DES

  • IDEA

  • RC4

18
New cards

The term "KEK" refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.

True

  • Key Encryption Key (KEK)

19
New cards

Which of the answers listed below refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

IKE (Internet Key Exchange)

20
New cards

Which of the following answers refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?

Diffie-Hellman Key Exchange (DHE)

21
New cards

Which of the answers listed below refers to a solution designed to strengthen the security of session keys?

Perfect Forward Secrecy (PFS)

22
New cards

Which of the following answers refers to a cryptographic key exchange protocol that leverages ECC for enhanced security and efficiency?

ECDH (Elliptic Curve Diffie-Hellman)

23
New cards

What is the name of a public-key cryptosystem that leverages the mathematical properties of large prime numbers to facilitate secure key exchange, create digital signatures, and encrypt data?

RSA (Rivest-Shamir-Adleman)

24
New cards

Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?

Elliptic Curve Cryptography (ECC)

25
New cards

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

AES

26
New cards

Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?

IDEA

27
New cards

What is the recommended replacement for DES?

AES

28
New cards

An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.

True

29
New cards

Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?

XOR

30
New cards

Which of the following answers refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?

Cipher Block Chaining (CBC)

31
New cards

Which cipher mode transforms a block cipher into a stream cipher enabling the encryption of individual bits or bytes of data?

Cipher Feedback (CFB)

32
New cards

A block cipher mode that combines a unique counter with encryption key to generate a stream of pseudorandom data blocks which are then used for encrypting data is called:

CTM

33
New cards

Which of the block cipher modes listed below is the simplest/weakest and therefore not recommended for use?

Electronic Codebook (ECB)

34
New cards

Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?

GCM 

35
New cards

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.

True

36
New cards

Which AES key length provides the highest level of security?

256-bit key