Upgrade to remove ads Show
Only ₩37,125/year
WEEK 2:: CRYPTOLOGY :: Cryptography Applications PRACTICE Terms in this set (17)What information does a digital certificate contain? Check all that apply. Digital signature Public Key Data Identifying information of the certificate owner. Which type of encryption does SSL/TLS use? Both : Asymmetric and Symmetric Encryptions What are some of the functions that a Trusted Platform Module can perform? Check all that apply. Remote Attestation Data Binding and Sealing. A TPM can be used for remote attestation, ensuring that a host is a known good state and hasn't been modified or tampered (from a hardware and a software perspective). TPMs can also seal and bind data to them, encrypting data against the TPM. This also allows it to be decrypted by the TPM, only if the machine is in a good and trusted state. Plaintext is the original message, while _____ is the encrypted message. Ciphertext The specific function of converting plaintext into ciphertext is called a(n) ______. Encryption Algorithm Studying how often letters and pairs of letters occur in a language is referred to as _______. Frequency Analysis. Frequency analysis involves studying how often letters occur, and looking for similarities in ciphertext to uncover possible plaintext mappings. True or false: The same plaintext encrypted using the same algorithm and same encryption key would result in different ciphertext outputs. False. If the plaintext, algorithm, and key are all the same, the resulting ciphertext would also be the same. The practice of hiding messages instead of encoding them is referred to as ______. Steganography ROT13 and a Caesar cipher are examples of _______. Substitution Ciphers DES, RC4, and AES are examples of ______ encryption algorithms. Symmetric Encryption Algorithm What are the two components of an asymmetric encryption system, necessary for encryption and decryption operations? Check all that apply. Public key and Private Key To create a public key signature, you would use the ______ key. Private Key. The private key is used to sign data. This allows a third party to verify the signature using the public key, ensuring that the signature came from someone in possession of the private key. Using an asymmetric cryptosystem provides which of the following benefits? Check all that apply. Non-repudiation If two different files result in the same hash, this is referred to as a ________. Hash collision When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password with the one stored on the system. Hash. Passwords are verified by hashing and comparing hashes. This is to avoid storing plaintext passwords. If a rainbow table is used instead of brute-forcing hashes, what is the resource trade-off? Rainbow tables use less computational resources and more storage space In a PKI system, what entity is responsible for issuing, storing, and signing certificates? Certificate Authority. The certificate authority is the entity that signs, issues, and stores certificates. Recommended textbook solutionsIntroduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Engineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Sets with similar termschapter 12 vocab20 terms bggoodwi Chapter 5 (Basic Cryptography)53 terms jhofer98 Chapter 530 terms andesava CISSP-Crypt-08212 terms musgraveritual Sets found in the same folderIT Security: Defense against the digital dark arts…27 terms snramos10 WEEK 4 :: PRACTICE QUIZ17 terms dojikerze WEEK 4 :: PRACTICE QUIZ :: NETWORK MONITORING5 terms dojikerze IT Security: Defense against the digital dark arts5 terms dojikerze Other sets by this creatorWEEK 5 PYTHON AUTOMATION SOFTWARE TESTING22 terms dojikerze WEEK 4 PYTHON AUTOMATION23 terms dojikerze AUTOMATED PYTHON WEEK 3 WORKING WITH REGULAR EXPRE…2 terms dojikerze WEEK 3:: PYTHON AUTOMATION REGEX(REGULAR EXPRESSIO…28 terms dojikerze Other Quizlet setsBacteriology Lab (streptococcus)21 terms Kirstin_Robertson3 Exam 162 terms melaniebrooke02PLUS Hosea 638 terms lodhiamb171 Astro 110: Unit 1/Module 3 (Zodiac Const…11 terms carsonsingerPLUS Related questionsQUESTION Presenting or generating AUTHENTICATION INFORMATION that corroborates the binding between the entity and the identifier 5 answers QUESTION What statement is true regarding the control the operator can exercise over the NAVTEX receivers operation? 4 answers QUESTION You must configure port rules for each NLB cluster node. 13 answers QUESTION This piece of code is inserted into a software system and will set off a malicious function when certain conditions are met. 15 answers What are the functions that a trusted platform module can perform?TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop). These artifacts can include passwords, certificates, or encryption keys.
What are some of the functions that a trusted platform module can perform quizlet?A TPM can be used for remote attestation, ensuring that a host is a known good state and hasn't been modified or tampered (from a hardware and a software perspective).
How is a message integrity check MIC different from a message authentication code MAC )? 1 point?How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)? A MIC only hashes the message, while a MAC incorporates a secret key. A MAC requires a password, while a MIC does not. They're the same thing.
What are the purposes of a digital signature select all that apply?A digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. Signers can also use them to acknowledge informed consent.
|