Bash, the Crucial Exams Chat Bot
AI Bot
ISC2 CISSP - Cryptography Fundamentals Flashcards
ISC2 CISSP Flashcards
| Front | Back |
| Asymmetric encryption uses a pair of keys: a public key and a private key. | True |
| In the encryption lifecycle | what phase involves key generation?,Key Management |
| Symmetric encryption uses the same key for both encryption and decryption. | True |
| What algorithm is commonly used for secure key exchange in asymmetric cryptography? | Diffie-Hellman |
| What does AES stand for? | Advanced Encryption Standard |
| What is a man-in-the-middle attack? | An attack where the adversary secretly intercepts and possibly alters the communication between two parties |
| What is a nonce? | A number used once to ensure freshness in cryptographic communication |
| What is digital signature used for? | To ensure non-repudiation and data integrity |
| What is entropy in the context of cryptography? | A measure of randomness or unpredictability in a key or system |
| What is public key infrastructure (PKI)? | A framework of policies and services to create, manage, distribute, and revoke digital certificates |
| What is steganography? | The practice of hiding messages within other non-secret text or data |
| What is the main difference between block ciphers and stream ciphers? | Block ciphers encrypt fixed-size blocks of data, while stream ciphers encrypt data one bit or byte at a time |
| What is the primary goal of cryptography? | To protect the confidentiality, integrity, and authenticity of information |
| What is the purpose of a cryptographic hash function? | To produce a fixed-size unique representation of data |
| What is the purpose of an Initialization Vector (IV)? | To ensure that the same plaintext encrypts to different ciphertexts each time |
| What is the role of a Certificate Authority (CA)? | To issue digital certificates that authenticate the identity of entities |
| What protocol is widely used to secure web traffic? | TLS (Transport Layer Security) |
| What protocol provides secure email communication? | S/MIME (Secure/Multipurpose Internet Mail Extensions) |
| Which cipher mode combines the IV with the first plaintext block. | CBC (Cipher Block Chaining) |
This deck explores cryptographic concepts, protocols, algorithms, and applications, as well as encryption lifecycle and implementation practices.