• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Which encryption algorithms can be used to encrypt and decrypt data?
RC5
Secret Key encryption is also known as:
Symmetrical
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
RSA
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
Steganography
Each user has a pair of cryptographic keys---a public key and a private key. The main difference between a public key and a private key is that:
The private key is only used by the client and kept secret while the public key is available to all.
Which of the following is a well-studied block cipher based on DES and the LEAST secure algorithm?
LANMAN
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?
MD5
Which key is generally applied FIRST to a message digest to provide non-repudiation by use of asymmetric cryptography?
Private Key of the sender
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database. Which description is correct when a hashing algorithm generates the same hash for two different messages?
A collision occurred
If a large key size is used, which of the following encryption algorithm is fast and hard to break?
Symmetric
In order to encrypt credit card data, which will be the most secure algorithm with the least CPU utilization?
AES
Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?
Confidentiality
If properly used, the perfect encryption scheme that is considered to be unbreakable is:
One time pad
Which statement correctly describes the difference between a secure cipher and a secure hash?
A cipher can be reversed, a hash cannot.
In an unsecured network, which of the following allows for secure key exchange without a pre-shared key?
DH-ECC
Which of the following increases the collision resistance of a hash?
Salt
How many keys are utilized with asymmetric cryptography?
Two
Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
One way funtion
In an unsecured network, which of the following allows for secure key exchange without a pre-shared key?
DH-ECC
Which of the following is a form of security through obscurity that allows an attacker to manipulate files using the least significant bit(s) to secretly embed data?
steganography