Objectives Master Set questions with |\ |\ |\ |\ |\
answers
Public key infrastructure (PKI) - CORRECT ANSWERS ✔✔A system
|\ |\ |\ |\ |\ |\ |\ |\ |\
that manages the creation, distribution, and revocation of digital
|\ |\ |\ |\ |\ |\ |\ |\ |\
certificates.
Public key - CORRECT ANSWERS ✔✔A cryptographic key that is
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
used for encryption and verifying digital signatures in asymmetric
|\ |\ |\ |\ |\ |\ |\ |\
encryption.
|\
Private key - CORRECT ANSWERS ✔✔A cryptographic key that is
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
used for decryption and creating digital signatures in asymmetric
|\ |\ |\ |\ |\ |\ |\ |\
encryption.
|\
Key escrow - CORRECT ANSWERS ✔✔A process where a trusted
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
third party holds a copy of an encryption key.
|\ |\ |\ |\ |\ |\ |\ |\
Encryption - CORRECT ANSWERS ✔✔The process of converting
|\ |\ |\ |\ |\ |\ |\ |\
plaintext into ciphertext to protect data confidentiality.
|\ |\ |\ |\ |\ |\
Full-disk encryption - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\
encrypting the entire disk to protect all data stored on it.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
,Partition encryption - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\
encrypting a specific partition on a disk.
|\ |\ |\ |\ |\ |\
File encryption - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\
encrypting individual files to protect their contents.
|\ |\ |\ |\ |\ |\
Volume encryption - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\
encrypting a logical volume, which can span multiple disks or
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
partitions.
Database encryption - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\
encrypting a database to protect its contents.
|\ |\ |\ |\ |\ |\
Record encryption - CORRECT ANSWERS ✔✔The process of
|\ |\ |\ |\ |\ |\ |\ |\
encrypting individual records within a database.
|\ |\ |\ |\ |\
Transport/communication encryption - CORRECT ANSWERS |\ |\ |\ |\ |\
✔✔The process of encrypting data during transmission to ensure
|\ |\ |\ |\ |\ |\ |\ |\ |\
its confidentiality.
|\
Asymmetric encryption - CORRECT ANSWERS ✔✔A cryptographic
|\ |\ |\ |\ |\ |\ |\
system that uses two different keys: a public key for encryption
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
and a private key for decryption.
|\ |\ |\ |\ |\
Symmetric encryption - CORRECT ANSWERS ✔✔A cryptographic
|\ |\ |\ |\ |\ |\ |\
system that uses the same key for both encryption and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
decryption.
,Key exchange - CORRECT ANSWERS ✔✔The process of securely
|\ |\ |\ |\ |\ |\ |\ |\ |\
sharing encryption keys between parties.
|\ |\ |\ |\
Algorithms - CORRECT ANSWERS ✔✔Mathematical functions used
|\ |\ |\ |\ |\ |\
in encryption and decryption processes.
|\ |\ |\ |\ |\
Key length - CORRECT ANSWERS ✔✔The size of the encryption
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
key, measured in bits.
|\ |\ |\
Trusted Platform Module (TPM) - CORRECT ANSWERS ✔✔A
|\ |\ |\ |\ |\ |\ |\ |\
hardware component that provides secure storage and
|\ |\ |\ |\ |\ |\ |\
cryptographic functions. |\
Hardware security module (HSM) - CORRECT ANSWERS ✔✔A
|\ |\ |\ |\ |\ |\ |\ |\
physical device that generates, stores, and manages
|\ |\ |\ |\ |\ |\ |\
cryptographic keys. |\
Key management system - CORRECT ANSWERS ✔✔A system that
|\ |\ |\ |\ |\ |\ |\ |\
handles the generation, storage, and distribution of
|\ |\ |\ |\ |\ |\ |\ |\
cryptographic keys. |\
Secure enclave - CORRECT ANSWERS ✔✔A secure area within a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
processor that protects sensitive data.
|\ |\ |\ |\
Obfuscation - CORRECT ANSWERS ✔✔The process of making
|\ |\ |\ |\ |\ |\ |\ |\
something unclear or difficult to understand.
|\ |\ |\ |\ |\
, Steganography - CORRECT ANSWERS ✔✔The process of hiding |\ |\ |\ |\ |\ |\ |\ |\
secret information within an innocent-looking carrier file.
|\ |\ |\ |\ |\ |\
Tokenization - CORRECT ANSWERS ✔✔The process of replacing
|\ |\ |\ |\ |\ |\ |\ |\
sensitive data with a non-sensitive token.
|\ |\ |\ |\ |\
Data masking - CORRECT ANSWERS ✔✔The process of modifying
|\ |\ |\ |\ |\ |\ |\ |\ |\
sensitive data to protect its confidentiality.
|\ |\ |\ |\ |\
Hashing - CORRECT ANSWERS ✔✔The process of converting data
|\ |\ |\ |\ |\ |\ |\ |\ |\
into a fixed-size string of characters.
|\ |\ |\ |\ |\
Salting - CORRECT ANSWERS ✔✔The process of adding random
|\ |\ |\ |\ |\ |\ |\ |\ |\
data to the input of a hash function to prevent precomputed
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
attacks.
Digital signatures - CORRECT ANSWERS ✔✔A cryptographic
|\ |\ |\ |\ |\ |\ |\
mechanism to verify the authenticity and integrity of digital
|\ |\ |\ |\ |\ |\ |\ |\ |\
documents.
Key stretching - CORRECT ANSWERS ✔✔A technique to make a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
cryptographic key more resistant to brute-force attacks. |\ |\ |\ |\ |\ |\
Blockchain - CORRECT ANSWERS ✔✔A distributed ledger that
|\ |\ |\ |\ |\ |\ |\ |\
records transactions across multiple computers.
|\ |\ |\ |\