Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
What Cryptographic protocal and infrustructure was developed to send Credit Card numbers over the Internet?
|
SET = Secure Electronic Transaction.
|
|
What hashing algorithum provides the best defense against birthday attacks?
|
Sha-1, because it uses a large message digest of 180 bits - this means there is less chance for collision.
|
|
What is it called when a hash produces two identical message digests?
|
Collision
|
|
Name three Asymetric Algorithums that provide for key distribution, data encryption, and digital signature?
|
1. RSA
2. El Gamal 3. Eliptic Curve |
|
What is Steganography?
|
Messages hidden in graphic files, wav files, slack space or document headers.
|
|
What protocal does Clipper chip use? What is the key length? What is the purpose of skipjack?
|
1. Skip Jack
2. 80 Bits 3. Spying of the public |
|
What is the proper way to distroy a key?
|
Zeroize
|
|
Is Asymetric Cryptology faster or slower the Symetric Cryptology?
|
Slower
|
|
SSL provides security at what level of the OSI?
|
Transport Layer
|
|
Name some strengths of the Asymetric Cryptology? Name one weakness?
|
1. Scalability
2. Easier Key Distribution 3. Meets all three legs of the CISSP triadd. 4. Slower then Symetric systems due to processing requirments |
|
Name some strengths of the Symetric Cryptology? Name one weakness?
|
1. Faster
2. More secure 3. Only meets one leg in the CISSP triadd |
|
What is the only stream cypher that maybe seen on the test? What application is this cypher most suited for?
|
1. RC4
2. SQL |
|
Name three stream modes used in DES, and which is the fastest?
|
1. CFB = Cypher feed back
2. OFB = Output feed back 3. CTB = Counter feed back 4. Counter feed back is the fastest |
|
When using DES - shhould ECB "Electronic Code Book" be used for Graphics?
|
NO
|
|
How may bits does Sha-1 use and what is the most common use for Sha-1?
|
1. Uses 160 bits
2. Hashing Passwords |