PRELIM(mod3) Flashcards

(40 cards)

1
Q

Two inherent needs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography was coined by combining two Greek words

A

Krypto
Graphene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Krypto means

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Graphene means

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Constructing and analyzing protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are Central to modern cryptography

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

exists at the intersection of the disciplines of mathematics,compsci,ee,comms ile and physics

A

Modern cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Applications for cryptography

A

Digital currencies, computer passwords, electronic commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Modern cryptography concerns with

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information cannot be understood by anyone

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Info cannot be altered

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cannot deny his or her intention

A

Sender and receiver can confirm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptography is used in many applications like?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of cryptographic techniques

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sender and receiver share a single key

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Revolutionary concept

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

no key is used in this algorithm

18
Q

Web security is also known as?

19
Q

Means protecting a website

20
Q

Web security means protecting website by?

A

detecting, preventing, responding to cyber threats

21
Q

Popular technical solutions

22
Q

Top vulnerabilities for all web based

23
Q

Two big defense strategies

A

Resource assignment
Web scanning

24
Q

By assigning all necessary resources

25
is only good for known vulnerability threats
26
Web security also protects visitors from
S P S M S
27
prevents automated firewall
WAF
28
is a set of roles, policies, hardware, software and procedures
PKI
29
Technology for authenticating users and devices
PKI
30
user and devices that have keys
Entities
31
Document associating the key
certificate authority
32
These documents are called?
33
Only known by that entity and used for signing
Private key
34
Use for verifying signatures but cannot be used to sign in
Public key
35
binds public keys
PKI
36
Valid and correct registration is called
37
responsible for accepting requests
RA
38
Registration authority is usually called
Subordinate CA
39
Behalf of the CA
Third-party validation authority
40
Most commonly used format
X.509 standard