Bash, the Crucial Exams Chat Bot
AI Bot
Cryptography and Encryption (CEH) Flashcards
Certified Ethical Hacker (CEH) Flashcards
| Front | Back |
| How does a certificate authority (CA) work | It issues digital certificates to validate the identity of entities in a secure communication |
| What does "encryption" mean | The process of converting plaintext into ciphertext to protect information from unauthorized access |
| What does PKI stand for | Public Key Infrastructure |
| What is a brute force attack in cryptography | An attack method that systematically tries all possible combinations to decrypt data |
| What is a cryptographic nonce | A random value used only once to ensure uniqueness in cryptographic communications |
| What is a man-in-the-middle (MITM) attack | A cyberattack where an attacker intercepts and potentially alters communication between two parties |
| What is an example of a block cipher algorithm | AES (Advanced Encryption Standard) |
| What is an example of a stream cipher algorithm | RC4 |
| What is file integrity monitoring (FIM) | A process to check for unauthorized changes to files using hashing techniques |
| What is hashing in cryptography | The process of converting data into a fixed-length unique string using a hash function |
| What is MD5 and why is it considered insecure | MD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks |
| What is RSA encryption | An asymmetric encryption method that uses two keys, public and private, for secure communication |
| What is salting in hashing | Adding a unique random value to data before hashing to make the hash output unique even for identical inputs |
| What is steganography in the context of cryptography | The practice of hiding information within another file or medium to conceal its presence |
| What is the difference between encoding | encryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations |
| What is the difference between symmetric and asymmetric encryption | Symmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair |
| What is the key length of AES-256 | 256 bits |
| What is the main purpose of a digital signature | To ensure the authenticity and integrity of a message or document |
| What is the main weakness of a weak encryption key | A weak key increases the risk of decryption by brute force or cryptanalysis |
| What is the primary purpose of AES (Advanced Encryption Standard) | To provide secure symmetric encryption for protecting data |
| What is the purpose of a hash function | To create a fixed-length output from input data for integrity verification |
| What is the purpose of cryptography | To secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation |
| What is the role of public key infrastructure (PKI) | To manage digital certificates and public-private key pairs for secure communications |
| What is the SHA-2 algorithm | A family of cryptographic hash functions designed to provide stronger security than SHA-1 |
| What is the significance of the Diffie-Hellman algorithm | It enables two parties to securely exchange cryptographic keys over an insecure channel |
Front
What is the SHA-2 algorithm
Click the card to flip
Back
A family of cryptographic hash functions designed to provide stronger security than SHA-1
Front
What is the significance of the Diffie-Hellman algorithm
Back
It enables two parties to securely exchange cryptographic keys over an insecure channel
Front
What is the role of public key infrastructure (PKI)
Back
To manage digital certificates and public-private key pairs for secure communications
Front
What is RSA encryption
Back
An asymmetric encryption method that uses two keys, public and private, for secure communication
Front
What is the difference between symmetric and asymmetric encryption
Back
Symmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair
Front
How does a certificate authority (CA) work
Back
It issues digital certificates to validate the identity of entities in a secure communication
Front
What is file integrity monitoring (FIM)
Back
A process to check for unauthorized changes to files using hashing techniques
Front
What is an example of a stream cipher algorithm
Back
RC4
Front
What is a brute force attack in cryptography
Back
An attack method that systematically tries all possible combinations to decrypt data
Front
What is the main purpose of a digital signature
Back
To ensure the authenticity and integrity of a message or document
Front
What is the primary purpose of AES (Advanced Encryption Standard)
Back
To provide secure symmetric encryption for protecting data
Front
What is salting in hashing
Back
Adding a unique random value to data before hashing to make the hash output unique even for identical inputs
Front
What does PKI stand for
Back
Public Key Infrastructure
Front
What is the purpose of a hash function
Back
To create a fixed-length output from input data for integrity verification
Front
What is the key length of AES-256
Back
256 bits
Front
What is hashing in cryptography
Back
The process of converting data into a fixed-length unique string using a hash function
Front
What is the difference between encoding
Back
encryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations
Front
What is an example of a block cipher algorithm
Back
AES (Advanced Encryption Standard)
Front
What does "encryption" mean
Back
The process of converting plaintext into ciphertext to protect information from unauthorized access
Front
What is steganography in the context of cryptography
Back
The practice of hiding information within another file or medium to conceal its presence
Front
What is MD5 and why is it considered insecure
Back
MD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks
Front
What is a cryptographic nonce
Back
A random value used only once to ensure uniqueness in cryptographic communications
Front
What is the main weakness of a weak encryption key
Back
A weak key increases the risk of decryption by brute force or cryptanalysis
Front
What is the purpose of cryptography
Back
To secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation
Front
What is a man-in-the-middle (MITM) attack
Back
A cyberattack where an attacker intercepts and potentially alters communication between two parties
1/25
This deck explains cryptographic concepts, hashing, encryption methods, and their applications in securing data, as well as their relevance in ethical hacking.