• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
What Cryptographic protocal and infrustructure was developed to send Credit Card numbers over the Internet?
SET = Secure Electronic Transaction.
What hashing algorithum provides the best defense against birthday attacks?
Sha-1, because it uses a large message digest of 180 bits - this means there is less chance for collision.
What is it called when a hash produces two identical message digests?
Collision
Name three Asymetric Algorithums that provide for key distribution, data encryption, and digital signature?
1. RSA
2. El Gamal
3. Eliptic Curve
What is Steganography?
Messages hidden in graphic files, wav files, slack space or document headers.
What protocal does Clipper chip use? What is the key length? What is the purpose of skipjack?
1. Skip Jack
2. 80 Bits
3. Spying of the public
What is the proper way to distroy a key?
Zeroize
Is Asymetric Cryptology faster or slower the Symetric Cryptology?
Slower
SSL provides security at what level of the OSI?
Transport Layer
Name some strengths of the Asymetric Cryptology? Name one weakness?
1. Scalability
2. Easier Key Distribution
3. Meets all three legs of the CISSP triadd.
4. Slower then Symetric systems due to processing requirments
Name some strengths of the Symetric Cryptology? Name one weakness?
1. Faster
2. More secure
3. Only meets one leg in the CISSP triadd
What is the only stream cypher that maybe seen on the test? What application is this cypher most suited for?
1. RC4
2. SQL
Name three stream modes used in DES, and which is the fastest?
1. CFB = Cypher feed back
2. OFB = Output feed back
3. CTB = Counter feed back
4. Counter feed back is the fastest
When using DES - shhould ECB "Electronic Code Book" be used for Graphics?
NO
How may bits does Sha-1 use and what is the most common use for Sha-1?
1. Uses 160 bits
2. Hashing Passwords