Chapter 5, 6

25 July 2022
4.7 (114 reviews)
74 test answers

Unlock all answers in this set

Unlock answers (70)
question
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?
answer
userA's public key
question
Which of the following is a legitimate responsibility of an organization regarding user private data?
answer
Use proprietary methods for data collection to maintain security.
question
Steganography can only utilize image files to hide data.
answer
false
question
How many keys are used in symmetric cryptography?
answer
One
question
List the four characteristics a hash algorithm should have if it is to be considered secure.
answer
Two different data sets can't make the same digest all data provides the same size digest its impossible to make a data set that has a desired or predefined hash the digest can't be reversed
question
Unlike hashing, in which the hash is not intended to be decrypted, ______________ algorithms are designed to encrypt and decrypt the ciphertext using a single key.
answer
symmetric
question
Which of the following is a place where steganography can hide data?
answer
in the metadata of a file
question
Which technology hides the existence of data?
answer
Steganography
question
Why is public key cryptography?
answer
Public Key Cryptography uses a pair of keys that are used to encrypt and decrypt data and to protect against unauthorized access.
question
Which of the following is NOT an element of asymmetric cryptography?
answer
Hash algorithm
question
A unique mathematical __________ is input into the encryption algorithm to lock down the data by creating the ciphertext.
answer
key
question
Online data is collected for a number of activities, but not for online purchases.
answer
False
question
_________________ provides proof of the genuineness of the user.
answer
Authentication
question
What is another name for asymmetric cryptography?
answer
Public key cryptography
question
Which of the following is an advantage of hardware encryption over software encryption?
answer
Hardware encryption is not subject to attacks like software encryption
question
Proving that a document was created by a particular user is referred to as which of the following?
answer
nonrepudiation
question
Which of the following is NOT true regarding how individuals are concerned how their private data is being used?
answer
Their personal information is no more at risk today than it was 10 years ago.
question
Which of the following can be described as data that is used to describe the content or structure of the actual data?
answer
Metadata
question
Which of the following is NOT a privacy best practice?
answer
Always carry your Social Security number with you
question
List and briefly describe four ways you can better protect your privacy and security.
answer
-Think before you do something -Stay updated -check out your privacy setting -block the cookies -have secure connections
question
Which type of cryptography creates a value that is primarily used for comparison purposes?
answer
hashing
question
Procedures based on a mathematical formula used to encrypt and decrypt the data
answer
algorithm
question
Cryptography that uses two mathematically related keys
answer
asymmetric
question
The unique digital fingerprint created by a one-way hash algorithm
answer
digest
question
A mathematical value entered into a cryptographic algorithm to produce encrypted data
answer
key
question
Unencrypted data cleartext
answer
cleartext
question
The process of proving that a user performed an action
answer
nonrepudiation
question
An asymmetric encryption key that must be protected
answer
private key
question
An asymmetric encryption key that does not have to be protected
answer
public key
question
Encryption that uses a single key to encrypt and decrypt a message
answer
symmetric
question
Which of the following is NOT a protection for information that cryptography can provide?
answer
redundancy
question
If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message?
answer
userC's public key
question
What are the three benefits of a digital signature?
answer
contract speed enhanced security lower transaction
question
How can cryptography protect confidentiality of information?
answer
Cryptography can keep information confidently by having public and private keys. when the data get encrypted all the words change so the only person who will be able to see it is people with the keys
question
Which of the following creates a digest and does not create ciphertext that can later be decrypted?
answer
hash alhorithm
question
A digital signature can provide which of the following benefits?
answer
data integrity
question
Which of these is a characteristic of a secure hash algorithm?
answer
Two different sets of data cannot produce the same digest
question
What is the security advantage of turning on guest access?
answer
it separates the guest traffic from the nonguest traffic on the internet.
question
Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.
answer
False
question
What serves as the network name identifier in a Wi-Fi network?
answer
SSID
question
What security feature on a smartphone prevents the device from being used until a passcode is entered?
answer
lock screen
question
Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.
answer
True
question
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
answer
remote wipe
question
Whereas tablets are designed for performance, laptops are focused on ease of use.
answer
False
question
What is Wi-Fi Protected Setup (WPS)?
answer
this lets you join a network without selecting the network name and entering a password
question
Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?
answer
Bluesnarfing
question
What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?
answer
encryption
question
Briefly describe Wi-Fi.
answer
Wi-Fi is a wireless network that allows computers and other devices to communicate.
question
Which type of Wi-Fi device acts as the base station for wireless devices as well as providing a gateway to the external Internet?
answer
wireless router
question
Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.
answer
True
question
Which mobile device setting regulates when the device goes into hibernation mode
answer
sleep time
question
A more sophisticated device used in an office setting instead of a wireless router
answer
access point
question
An attack that sends unsolicited messages to Bluetooth-enabled devices
answer
bluejacking
question
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
answer
bluesnarfing
question
An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device
answer
evil twin
question
Removing the built-in limitations and protections on Google Android devices
answer
rooting
question
Downloading an app from an unofficial third-party website
answer
sideloading
question
A new class of mobile technology consisting of devices that can be worn by the user instead of carried
answer
wearable technology
question
A security setting that provides the optimum level of wireless security
answer
WPA2 personal
question
The technical name for a Wi-Fi network
answer
WLAN
question
Most Bluetooth devices have a range of only about 10 meters.
answer
True
question
There are two major types of wireless networks that are popular today among users. One of these networks is Wi-Fi; what is the other?
answer
bluetooth
question
In the field of computer networking and wireless communications, what is the most widely known and influential organization?
answer
IEEE
question
____________________ is a wireless data network technology that is designed to provide high-speed data connections for mobile devices.
answer
Wi-Fi
question
The current location of a device can be pinpointed on a map through the device's _______________.
answer
GPS
question
Which of the following is an optional means of configuring WPA2 Personal security using a PIN?
answer
Wi-Fi Protected Setup (WPS)
question
An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?
answer
evil twin
question
From what term is war driving derived?
answer
war dialing
question
What is the most secure option for the type of passcode that can be entered to access a mobile device?
answer
strong alphanumeric password
question
In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a(n) ____________________ is used.
answer
access point / ap
question
What are some of the attacks on Wi-Fi?
answer
someone could use a pineapple device or there could be a fake network
question
What is Bluetooth's rate of transmission?
answer
1 Mbps
question
Why should you disable Bluetooth on smartphones and tablets?
answer
you should disable your Bluetooth because when it is on you open yourself up for vulnerabilities
question
What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?
answer
virtual private network