Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4,6 TrustPilot
logo-home
Exam (elaborations)

SECURITY+ STUDY GUIDE QUESTIONS AND CORRECT ANSWERS

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
26-02-2026
Written in
2025/2026

SECURITY+ STUDY GUIDE QUESTIONS AND CORRECT ANSWERS

Institution
Sappc
Course
Sappc

Content preview

SECURITY+ STUDY GUIDE QUESTIONS
AND CORRECT ANSWERS

CIAA2TriadA2-A2Ans--Confidentiality,A2Integrity,A2Availability

4A2PrimaryA2functionsA2ofA2CryptographyA2-A2Ans--
Confidentiality,A2Integrity,A2Authentication,A2andA2Non-repudiation

SubstitutionA2CipherA2-A2Ans--
TypeA2ofA2codingA2orA2cipheringA2systemA2thatA2changesA2oneA2characterA2orA2symbolA2in
toA2another.

TranspositionA2-A2Ans--ChangingA2theA2positionsA2ofA2plaintextA2letters.

Exclusive-ORA2(XOR)A2OperationA2-A2Ans--
BinaryA2MathematicalA2operationA2whichA2compairesA2twoA2bitsA2toA2produceA2anA2output.
A2PlaintextA2isA2XORedA2withA2aA2randomA2keystreamA2toA2generateA2ciphertext.A2IfA2valu
esA2areA2same,A2resultA2isA20.A2IfA2valuesA2areA2different,A2resultA2isA21.

One-TimeA2PadA2-A2Ans--ConsideredA2unbreakable.
EachA2padA2inA2theA2schemeA2mustA2meetA2theA2followingA2requirements:
-A2MadeA2upA2ofA2trulyA2randomA2values
-A2MustA2beA2atA2leastA2asA2longA2asA2theA2message
-A2UsedA2onlyA2once
-A2SecurelyA2distributedA2toA2destination
-A2ProtectedA2atA2sender'sA2andA2receiver'sA2sites

InitializationA2VectorsA2-A2Ans---A2RandomA2valuesA2usedA2w/
algorithmsA2toA2ensureA2patternsA2areA2notA2createdA2duringA2theA2encryptionA2process
-A2UsedA2withA2keys
-A2DoA2notA2needA2toA2beA2encryptedA2whenA2beingA2sentA2toA2theA2destination
-
A2IfA2IVsA2areA2notA2used,A2anA2attackerA2canA2breakA2theA2keyspaceA2becauseA2ofA2patter
nsA2resultingA2fromA2thheA2encryptionA2process

AlternateA2DataA2StreamsA2(ADS)A2-A2Ans---
A2providesA2hackersA2withA2aA2methodA2ofA2hidingA2toolsA2onA2aA2breachedA2systemA2andA
2executingA2themA2withoutA2beingA2detected
-A2allowA2forA2compatibilityA2withA2theA2MacintoshA2HierarchicalA2FileA2System
-A2usedA2legitimatelyA2byA2aA2varietyA2ofA2programs
-
A2ADSA2executableA2appearA2toA2runA2asA2theA2originalA2file,A2undetectableA2toA2processA2
viewersA2likeA2WindowsA2TaskA2Manager

,-
A2notA2onlyA2possibleA2toA2hideA2aA2file,A2butA2toA2alsoA2hideA2theA2executionA2ofA2anA2illegit
imateA2process

SymmetricA2CryptographyA2-A2Ans---
A2a.k.a.A2SecretA2Key,A2PrivateA2Key,A2SharedA2Key,A2SameA2Key,A2SingleA2Key,A2Sessio
nA2Key
-A2BestA2suitedA2forA2bulkA2encryption;A2muchA2fasterA2thanA2asymmetricA2cryptography
-A2BothA2partiesA2shareA2theA2sameA2key
-A2StreamA2cipherA2(EncryptedA2bit-by-bitA2orA2byteA2byA2byte)
-A2BlockA2cipherA2(AppliedA2toA2aA2collectionA2ofA2bitsA2orA2bytes)
RequireA2bothA2endsA2ofA2anA2encryptedA2messageA2toA2haveA2theA2sameA2keyA2andA2pro
cessingA2algorithms.

BlockA2CipherA2-A2Ans---A2usuallyA2implementedA2inA2software
-A2TransformsA2fixed-
lengthA2blocksA2ofA2plaintextA2intoA2cipherA2textA2ofA2theA2sameA2length
-A2DataA2isA2encryptedA2block-by-block
-A2UsesA2subsitutionA2andA2transpositionA2ciphers
-A2StrongerA2thanA2stream-basedA2ciphers
-A2SlowA2andA2resourceA2intensive

AA2methodA2ofA2encryptingA2textA2inA2whichA2aA2cryptographicA2keyA2andA2algorithmA2areA
2appliedA2toA2aA2blockA2ofA2dataA2atA2onceA2asA2aA2group,A2ratherA2thanA2toA2oneA2bitA2atA2
aA2time

StreamA2CipherA2-A2Ans---A2DataA2encryptedA2bit-by-bit
-A2PlaintextA2mixedA2withA2aA2keystreamA2controlledA2byA2aA2key
-A2UsuallyA2implementedA2inA2hardware
-A2RequiresA2noA2memory
-A2DataA2isA2encryptedA2on-the-fly
-A2AA2veryA2fastA2mathematicalA2operation

AA2methodA2ofA2encryptingA2textA2inA2whichA2aA2cryptographicA2keyA2andA2algorithmA2areA
2appliedA2toA2eachA2binaryA2digitA2inA2aA2dataA2stream,A2oneA2bitA2atA2aA2time.


SymmetricA2KeyA2EncryptionA2-A2Ans--
InA2orderA2toA2ensureA2secureA2communicationsA2betweenA2everyoneA2inA2aA2populationA2
ofA2nA2people,A2aA2totalA2ofA2n(n-1)/2A2keysA2areA2needed.

DataA2EncryptionA2StandardA2(DES)A2-A2Ans---A2BasedA2onA2IBM'sA2LuciferA2algorithm
-A264-bitA2blockA2(56-bitA2keyA2+A28A2bitsA2forA2parity)
-A2Algorithm:A2DEAA2(DataA2EncryptionA2Algorithm)
-A2EasilyA2broken

Triple-DESA2(3DES)A2-A2Ans---A2UpdgradeA2ofA2DESA2(stillA2inA2use)

, -A2AppliesA2DESA2threeA2times
-A2168-bitA2keyA2(+24A2forA2parity)

AdvancedA2EncryptionA2StandardA2(AES)A2-A2Ans---
A2CurrentA2standardA2(replacedA2DES)
-A2128A2bitA2block
-A2KeyA2sizes:A2128,A2192,A2andA2256A2bits
-A2Algorithm:A2Rijndael

TwofishA2-A2Ans---A2128-bitA2blockA2cipher
-A2Variable-lengthA2keysA2(128,A2192,A2orA2256-bits)
-A2FinalistA2forA2AES

CASTA2-A2Ans---A2developedA2byA2CarlisleA2AdamsA2andA2StaffordA2TavaresA2(CAST)

CAST-128A2-A2Ans---A264-bitA2blockA2size
-A2variableA2keyA2lengthsA2(40A2toA2128-bits)

CAST-256A2-A2Ans---A2128-bitA2blockA2size
-A2variableA2keyA2lenthsA2(128,A2160,A2192,A2224,A2256-bits)

InternationalA2DataA2EncryptionA2AlgorithmA2(IDEA)A2-A2Ans---A264-bitA2blockA2cipher
-A2128-bitA2keyA2length
-A2DevelopedA2byA2theA2Swiss
-A2UsedA2inA2PGPA2andA2otherA2encryptionA2software

SecureA2andA2FastA2EncryptionA2RoutineA2(SAFER)A2-A2Ans---
A2UsedA2inA2BluetoothA2forA2keyA2derivation,A2notA2forA2encryption
-A2SAFER+
-A2128-bitA2blockA2cipher
-A2SAFER++
-A264A2andA2128-bitA2blockA2cipher

WholeA2DiskA2EncryptionA2-A2Ans---A2a.k.aA2FullA2diskA2encryption
-
A2softwareA2orA2hardwareA2whichA2encryptsA2everyA2bitA2ofA2dataA2onA2aA2diskA2orA2diskA2v
olume
-A2someA2softwareA2canA2leaveA2theA2MasterA2BootA2RecordA2(MBR)A2unencrypted
-A2SomeA2hardware-
basedA2encryptionA2systemsA2encryptA2theA2entireA2bootA2disk,A2includingA2theA2MBR
-A2AESA2primarilyA2used

AsymmetricA2CyptographyA2-A2Ans---A2a.k.aA2PublicA2KeyA2Encryption
-A2BasedA2onA2mathematicalA2numberA2theory
-A2EachA2userA2hasA2twoA2keys:A2Public/Private
-A2PublicA2keyA2isA2availableA2toA2everyone

Written for

Institution
Sappc
Course
Sappc

Document information

Uploaded on
February 26, 2026
Number of pages
30
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

R281,96
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
LECTUREKIM

Document also available in package deal

Get to know the seller

Seller avatar
LECTUREKIM stuvia
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
4 months
Number of followers
0
Documents
3034
Last sold
3 weeks ago

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions