Bash, the Crucial Exams Chat Bot
AI Bot

Cryptography Basics Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

Study our Cryptography Basics flashcards for the ISC2 Certified in Cybersecurity (CC) exam with 20+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
ISC2 Certified in Cybersecurity (CC) Course Header Image
FrontBack
What does SSL/TLS use for encryptionA combination of symmetric and asymmetric encryption techniques
What is a brute force attackMethod of cracking encryption by systematically testing all possible keys
What is a certificate authority (CA)An entity that issues digital certificates to authenticate the identity of organizations and individuals
What is a CipherAn algorithm for performing encryption or decryption
What is a digital signatureA cryptographic method for verifying the authenticity and integrity of a digital message or document
What is a hash functionA function that converts input data into a fixed-size unique string called a hash
What is an example of a symmetric encryption algorithmAES
What is an example of an asymmetric encryption algorithmRSA
What is asymmetric encryptionEncryption method where a pair of keys (public and private) is used
What is key exchangeThe process of securely sharing encryption keys between parties
What is key length's importance in cryptographyLonger keys provide stronger security against brute force attacks
What is symmetric encryptionEncryption method where the same key is used for both encryption and decryption
What is the difference between a stream cipher and a block cipherStream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks
What is the difference between encryption and hashingEncryption is reversible with a key while hashing is one-way and irreversible
What is the difference between MD5 and SHA-256SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm
What is the main weakness of symmetric encryptionKey distribution since both parties need access to the same secret key
What is the primary purpose of cryptographyEnsuring confidentiality, integrity, authentication, and non-repudiation of data
What is the purpose of a private key in asymmetric cryptographyUsed for decryption or creating digital signatures
What is the purpose of a public key in asymmetric cryptographyUsed for encryption or verifying digital signatures
What is the role of a cryptographic saltTo add randomness to hashes and protect against precomputed attacks like rainbow tables

About the Flashcards

Flashcards for the ISC2 Certified in Cybersecurity (CC) exam focus on essential cryptography terminology you need to recall on test day. Each card delivers concise definitions that clarify how data confidentiality, integrity, authentication, and non-repudiation are achieved.

Review the strengths and weaknesses of AES, RSA, stream and block ciphers; compare MD5 with SHA-256; and understand how salts, key length, and key exchange protect against brute-force and rainbow-table attacks. The deck also explains digital signatures, certificate authorities, and the hybrid encryption model used in SSL/TLS, helping you quickly connect theoretical concepts with real-world applications likely to appear on the exam.

Topics covered in this flashcard deck:

  • Symmetric vs asymmetric encryption
  • Hashing and hash algorithms
  • Digital signatures & PKI
  • Key management & exchange
  • Cryptographic attacks and defenses
Share on...
Follow us on...