Bash, the Crucial Exams Chat Bot
AI Bot

Cryptography and Encryption (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

FrontBack
How does a certificate authority (CA) workIt issues digital certificates to validate the identity of entities in a secure communication
What does "encryption" meanThe process of converting plaintext into ciphertext to protect information from unauthorized access
What does PKI stand forPublic Key Infrastructure
What is a brute force attack in cryptographyAn attack method that systematically tries all possible combinations to decrypt data
What is a cryptographic nonceA random value used only once to ensure uniqueness in cryptographic communications
What is a man-in-the-middle (MITM) attackA cyberattack where an attacker intercepts and potentially alters communication between two parties
What is an example of a block cipher algorithmAES (Advanced Encryption Standard)
What is an example of a stream cipher algorithmRC4
What is file integrity monitoring (FIM)A process to check for unauthorized changes to files using hashing techniques
What is hashing in cryptographyThe process of converting data into a fixed-length unique string using a hash function
What is MD5 and why is it considered insecureMD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks
What is RSA encryptionAn asymmetric encryption method that uses two keys, public and private, for secure communication
What is salting in hashingAdding a unique random value to data before hashing to make the hash output unique even for identical inputs
What is steganography in the context of cryptographyThe practice of hiding information within another file or medium to conceal its presence
What is the difference between encodingencryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations
What is the difference between symmetric and asymmetric encryptionSymmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair
What is the key length of AES-256256 bits
What is the main purpose of a digital signatureTo ensure the authenticity and integrity of a message or document
What is the main weakness of a weak encryption keyA weak key increases the risk of decryption by brute force or cryptanalysis
What is the primary purpose of AES (Advanced Encryption Standard)To provide secure symmetric encryption for protecting data
What is the purpose of a hash functionTo create a fixed-length output from input data for integrity verification
What is the purpose of cryptographyTo secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation
What is the role of public key infrastructure (PKI)To manage digital certificates and public-private key pairs for secure communications
What is the SHA-2 algorithmA family of cryptographic hash functions designed to provide stronger security than SHA-1
What is the significance of the Diffie-Hellman algorithmIt enables two parties to securely exchange cryptographic keys over an insecure channel
This deck explains cryptographic concepts, hashing, encryption methods, and their applications in securing data, as well as their relevance in ethical hacking.
Share on...
Follow us on...