A | B |
What is integrity? | Protecting information from being modified by unauthorized parties |
What is confidentiality? | secrecy |
What is authentication? | confirmation |
If the plaintext cant be divided evenly into equal sized blocks, what is done to bring the plaintext to a proper length? | padding |
What is ECB? | electronic codebook |
What does CBC add on top of ECB? | randomization |
GCM and GMAC are given their names after which famous mathematician? | Galois |
What is a stream cipher? | A symmetric key cipher that encrypts plaintext one byte at a time |
______ are measurable physiological or behavioral characteristics which are used for biometrics. | biometric factors |
What is the AAA framework? | A simple way to understand security issues surrounding the access ability of individuals within an organization |
Which of the following is an example of "something you are"? | fingerprint |
Which of the following is an example of "something you have"? | USB Token |
Which of the following is an example of "something you know"? | a pin |
Which of the following is an example of "somewhere you are"? | an ip address |
Which of the following is an example of "something you do"? | a signature |
What type of trust involves domain B trusting domain A, but domain A not trusting domain B? | one-way |
What does PDS stand for? | protected distribution system |
What OSI Layer does Transport Layer Security (TLS) operate on? | Layer 4 (4-7) |
What is SFTP used for? | secure file transfer |
What is one of the most popular key exchange protocols? | diffie hellman protocol |