CIST 1601 FINAL EXAM REVIEW
UPDATED QUESTIONS AND CORRECT
ANSWERS.
Weakest part of an informatoin security system - ANS literally just being on the internet.
CIA - ANS Confidentially, Integrity and Availability
Threat - ANS Anything that can exploit a vulnerability, intentionally or accidentally, and
obtain, damage, or destroy an asset
Vulnerability - ANS Weakness or gaps in a security program that can be exploited by threats
Risk - ANS The potential for loss, damage, or destruction of an asset as a result of a threat
exploiting a vulnerability
Plaintext - ANS Encryption before decryption, a form easily read by humans
Ciphertext - ANS Encrypted results of plaintext
Encryption - ANS Act of transforming plaintext into ciphertext
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
, Decryption - ANS Act of transforming ciphertext into plaintext
Cryptography - ANS an algorithm to encrypt or decrypt information
Steganography - ANS Message itself may not be difficult to decode, but most people would
not detect the messages presence
Encryption - between - ANS you cannot decode message without knowing the proper key
Hash - ANS number generated from string of text, its smaller than the text and is generated
by formula in way that is extremely unlucky
Keyspace - ANS total number of possbile value of keys in cryptographic algorithm or other
measures like password
Nonrepudiation - ANS method of guaranteeing transmission between parties with digital
signature and encryption its one of fiver pillars of information assurance
Symmetric Key - ANS one key to encrypt and decrypt
Asymmetric Key - ANS two related keys: one encrypts and the other decrypts
Disadvantage of Symmetric key ciphers - ANS all parties involved must exchange the key
used to encrypt the data before they can decrypt it
DES - ANS common for data encryption and a form of secret
3DES - ANS triple data encryption algorithm is a symmetric-key block cipher
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
UPDATED QUESTIONS AND CORRECT
ANSWERS.
Weakest part of an informatoin security system - ANS literally just being on the internet.
CIA - ANS Confidentially, Integrity and Availability
Threat - ANS Anything that can exploit a vulnerability, intentionally or accidentally, and
obtain, damage, or destroy an asset
Vulnerability - ANS Weakness or gaps in a security program that can be exploited by threats
Risk - ANS The potential for loss, damage, or destruction of an asset as a result of a threat
exploiting a vulnerability
Plaintext - ANS Encryption before decryption, a form easily read by humans
Ciphertext - ANS Encrypted results of plaintext
Encryption - ANS Act of transforming plaintext into ciphertext
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
, Decryption - ANS Act of transforming ciphertext into plaintext
Cryptography - ANS an algorithm to encrypt or decrypt information
Steganography - ANS Message itself may not be difficult to decode, but most people would
not detect the messages presence
Encryption - between - ANS you cannot decode message without knowing the proper key
Hash - ANS number generated from string of text, its smaller than the text and is generated
by formula in way that is extremely unlucky
Keyspace - ANS total number of possbile value of keys in cryptographic algorithm or other
measures like password
Nonrepudiation - ANS method of guaranteeing transmission between parties with digital
signature and encryption its one of fiver pillars of information assurance
Symmetric Key - ANS one key to encrypt and decrypt
Asymmetric Key - ANS two related keys: one encrypts and the other decrypts
Disadvantage of Symmetric key ciphers - ANS all parties involved must exchange the key
used to encrypt the data before they can decrypt it
DES - ANS common for data encryption and a form of secret
3DES - ANS triple data encryption algorithm is a symmetric-key block cipher
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED