Ovido
Language
  • English
  • Spanish
  • French
  • Portuguese
  • German
  • Italian
  • Dutch
  • Swedish
Text
  • Uppercase

User

  • Log in
  • Create account
  • Upgrade to Premium
Ovido
  • Home
  • Log in
  • Create account

cyber security 4 & 5

Cryptography is often used to make a message unreadable.
what is used

to physically hide a message?

Steganography

The Steganography message is called
the what?

Plaintext

Steganography takes the data it is protecting and hides it within a file. The process can utilize many areas of the file.
Which of the choices shown is NOT used?

File name

When using steganography to hide a message you can increase the protection of a message by using cryptography to encrypt the message. Examine the choices provided and select the one that describes encrypted information.

Ciphertext

Digital files all contain hidden information used to describe the content and structure. This information is called what?

Metadata

What are the primes (P & Q) used for the key generation in this lab?

• 5 and 3

With this type of key cryptography, the sender and receiver of a message share a single common key.

Symmetric

Hashing aims to produce what?

A fixed-size bit string

MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?

128

RIPEMD is a suite of cryptographic hash functions developed basing upon what?

MD4

What is PBKDF2 for?

Hashing passwords for storage

Which of the following is true concerning
RC4?

RC4 as the most widely used software stream cipher (it is used in
TLS and WEP) is simple to use with good performance, but security weaknesses are present.

Which of the items in the list is NOT an intended purpose for the certificate examined in the lab?

Time Synchronization

The what
Cryptography Standard

was used to produce the VeriSign Public key examined in the lab?

RSA

What could be considered a weakness of a Digital Certificate?

Does not prove sender is the intended individual

In Active Directory, what does authorization?

LDAP

A Digital signature is a piece of data digest encrypted with what ?

The private key of the signer.

Which of the following may be used as an alternative to CRLs?

OCSP

What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?

OCSP

The security administrator for Conglomerate.com has been been directed by the ClO to reduce the cost of certificates.
Which of the following is the

FIRST step that should be taken?

Install a CA.

A centralized directory of digital certificates is called?

Certificate Repository (CR)

what is a published set of rules that govern the operation of a PKI.?

certificate policy (CP)

Which digital certificate displays the name of the entity behind the website?

Extended Validation (EV) Certificate

Public key infrastructure
(PKI) is what?

is the management of digital certificates

Which trust model has multiple CAs, one of which acts as a facilitator?

Bridge

what refers to a situation in which keys are managed by a third party, such as a trusted CA?

Key escrow

Which of these is considered the strongest cryptographic transport protocol?

TLS v1.2

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

salt

What entity calls in crypto modules to perform cryptographic tasks?

Crypto service provider

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

Cipher Block Chaining (CB)

what are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity?

Session keys

Which of these is NOT part of the certificate life cycle?

authorization

Digital certificates can be used for each of these
ЕХСЕРТ?

to verify the authenticity of the Registration Authorizer

Which of the following is
NOT a method for strengthening a key?

Variability

An entity that issues digital certificates is a what?

Certificate Authority (CA)

Which statement is NOT true regarding hierarchical trust models?

It is designed for use on a large scale.

The strongest technology that would assure Alice that
Bob is the sender of a message is?

digital certificate

what performs a real-time lookup of a digital certificate's status?

Online Certificate Status Protocol
(OCSP)

what is a protocol for securely accessing a remote computer?

Secure Shell (SSH)

A digital certificate associates what?

the user's identity with his public key

Quiz
privatjuridik fastighetsrätt
Vocabulary
1. Divers modes d’alimentation des animaux Les divers modes d’alimentation des a
DT 5 - Procedursedering
SYDAFRIKA
ogl202 - kopia
kut ak twee dagen van tevoren 😊
Causes of the rise of nationalism on india
literära begrepp
Frans
interaction motricité lefevbre CM
mariia
Physics
glosor
SCIENCE
DG
6008 IT Governance
CHM 7-9
6008 The NIST Framework
biology
Labratory Equipment
WHIMIS
Prendre
faire
aller
Être
Anatomie - examen pratique III
Avoir
mine
begrepp
nomenclature
Myanmar
show me
PSYCH 340: Chapter 2
Geometry Test
10 premiers verbes irreguliers_5eme_Madame Gravereaux Benoit_
PSYCH 340: Chapter 1
M&M
no läxa genetik
The Spleen Channel of Foot Taiyin
The Stomach Channel of Foot Yangming
The Large Intestine Channel of Hand Yangming
DT 5 - ÖNH
science
pharmaco
limbiska systemet
Organic Synthesis HT
Myanmar
Myanmar
de 12 kranialnerverna