Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
- Computer Security and Reliability
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (25)
A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?
X.509
Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?
ciphertext
Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?
symmetric
If a security expert decides to study the process of breaking encryption algorithms, they are performing which of the following?
cryptanalysis
In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?
ciphertext-only
In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?
chosen-ciphertext
What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?
L0phtcrack
What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?
RSA
What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?
ECC
What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?
brute force
What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?
known plaintext
What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?
SSL/TLS downgrade attack
What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?
chosen-plaintext
What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?
substitution cipher
What type of system converts between plaintext and ciphertext?
cryptosystem
When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?
dictionary
Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?
Nonrepudiation
Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?
AES-256
Which of the following is a function that takes a variable-length string or message and produces a fixed-length message digest?
hashing algorithm
Which of the following is a mathematical function or program that works with a key?
encryption algorithm
Which of the following is a range of allowable values that is used to generate an encryption key?
keyspace
Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?
EXPECT
Which of the following is the process of converting ciphertext back into plaintext?
decryption
Which of the following refers to verifying the sender or receiver (or both) is who they claim to be?
Authentication
Which type of symmetric algorithm operates on plaintext one bit at a time?
stream ciphers
Recommended textbook solutionsEngineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Starting Out with Java: From Control Structures Through Objects
5th EditionTony Gaddis
1,102 solutions
Computer Networking: A Top-Down Approach
7th EditionJames F. Kurose, Keith Ross
478 solutions
Sets with similar terms9.4
14 terms
gabbyalor
Chapter 14
21 terms
boiviet
Quiz 6
30 terms
thechuckster4
Sets found in the same folderChapter 7 - Programming for Security Professionals
24 terms
willtlee89
Ethical Hacking Exam 2
91 terms
ty_wickline
Chapter 6 - Enumeration
25 terms
willtlee89
ITEC 472 Entire Final
93 terms
DJFATWILL
Other sets by this creatorITEC 472 Chapter 11
25 terms
DJFATWILL
ITEC 472 Chapter 10
25 terms
DJFATWILL
ITEC 480 Final (Chapter 6-10)
73 terms
DJFATWILL
ITEC 475 Final Participation
14 terms
DJFATWILL
Other Quizlet setsHydrogeology unit 2
60 terms
sheenedzanap
Microbiology Midterm
43 terms
Yxvng_vad
OB Test 1 pt. 1 (NURS 3330)
139 terms
Pey10feemster
funds
43 terms
mayrasoria484
Related questionsQUESTION
When selecting an LF and obtaining video data, what must be clearly visible to determine the correct location was selected and to ensure that the video image can be trusted?
3 answers
QUESTION
Pseudo-random data added to a password before hashing is called:
15 answers
QUESTION
How do you set Hadoop to use YARN?
8 answers
QUESTION
What is the extension for a Tableau Server backup file?
3 answers