1. Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value
2. Encryption standard broken in 1998 - has a relatively short key length
3. Technique of encapsulating one packet of data within another type to create a secure link of transportation
4. Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)
5. Asymmetric cryptography - hashes - and digital signatures provide __________
6. Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP
7. HMAC stands for...
8. Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust
9. Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key
10. Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)
11. A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for
12. A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL
13. For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response
14. A protocol suite for securing network connections using IKE - AH - and ESP
15. Two different pieces of data have the same hash value
16. . Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution
17. Process of transforming plaintext into unreadable format
18. PPTP - L2TP - IPSec - and SSH
19. Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________
20. Symmetric cryptography - asymmetric cryptography - and hashes provide __________
21. Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation
22. Method of encryption and decryption
23. Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key
24. A cryptographic checksum used to provide integrity in symmetric key cryptography
25. Sequence of bits used in encryption and decryption - also known as cryptovariable
26. Encrypted text - also called cryptogram
27. Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC
28. Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)
29. Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing
30. Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality
Comptia Security +: Cyber Ops
Comptia Security +: Domain2 Compliance And Organization Security
Comptia Security +: Domain4 Application Security
Comptia Security + Exam
Comptia Security +: Network Access
Comptia Security +: Network Security
Related MCQ's