ENGINEERING QUESTIONS WITH ACCURATE ANSWERS
(OFFICIAL (ISC)²
Algorithm Accurate Answer - A mathematical function that is used in
the encryption and decryption processes.
Asymmetric Accurate Answer - Not identical on both sides. In
cryptography,
key pairs are used, one to encrypt, the other
to decrypt.
Availability Accurate Answer - Ensuring timely and reliable access to
and use of information by authorized users.
Certificate authority (CA) Accurate Answer - An entity trusted by one
or more users as an authority in a network that issues, revokes, and manages
digital certificates to bind
individuals and entities to their public keys.
CIA/AIC Triad Accurate Answer - Security model with the three
security concepts of confidentiality, integrity, and availability make up the CIA
Triad. It is also sometimes referred to as the AIC Triad.
Ciphertext Accurate Answer - The altered form of a plaintext message,
so as to be unreadable for anyone except the intended recipients. Something
that has been turned into a secret.
Confidentiality Accurate Answer - Preserving authorized restrictions
on information access and disclosure, including means for protecting personal
privacy and proprietary information.
Confusion Accurate Answer - Provided by mixing (changing) the key
values used during the repeated rounds of encryption. When the key is
modified for each round, it provides added complexity that the attacker would
encounter.
, Cryptanalysis Accurate Answer - The study of techniques for
attempting to defeat cryptographic techniques and, more generally,
information security services provided through cryptography.
Cryptology Accurate Answer - The science that deals with hidden,
disguised, or encrypted communications.
Cryptography Accurate Answer - Secret writing. Today provides the
ability to achieve confidentiality, integrity, authenticity, non-repudiation, and
access control.
Decryption Accurate Answer - The reverse process from encryption. It
is the process of converting a ciphertext message back into plaintext through
the use of the cryptographic algorithm and the appropriate key that was used
to do the original encryption.
Diffusion Accurate Answer - Provided by mixing up the location of the
plaintext throughout the ciphertext. The strongest algorithms exhibit a high
degree of confusion and diffusion.
Digital certificate Accurate Answer - An electronic document that
contains the name of an organization or individual, the business address, the
digital signature of the certificate authority issuing the certificate, the
certificate holder's public key, a serial number, and the expiration date. Used
to bind individuals and entities to their public keys. Issued by a trusted third
party referred to as a Certificate Authority (CA).
Decoding Accurate Answer - The reverse process from encoding -
converting the encoded message back into its plaintext format.
Digital Certificate Accurate Answer - An electronic document that
contains the name of an organization or individual, the business address, the
digital signature of the certificate authority issuing the certificate, the
certificate holder's public key, a serial number, and the expiration date
Digital rights management (DRM) Accurate Answer - A broad range of
technologies that grant control and protection to content providers over their
own digital media.