Questions and CORRECT Answers
Encryption - CORRECT ANSWER - Changing plaintext to ciphertext
-Applied to information at rest and in transit
Decryption - CORRECT ANSWER - Process of changing ciphertext into plaintext
Encrypt individual Files - CORRECT ANSWER - Aescrypt
Encrypt Full Disks - CORRECT ANSWER - Bitlocker (Windows)
Filevault (Mac)
Mono-alphabetic code - CORRECT ANSWER - A single mapping from our alphanet to a
cipher alphabet is created
-Early cryptosystems used this
Polyalphabetic - CORRECT ANSWER - The mapping of our alphabet to a number of
cipher alphabets
-Adds complexity
One-time pad - CORRECT ANSWER - Only uses its cipher code once
-Unbreakable
Pseudo-Random Number Generators - CORRECT ANSWER - (PRNGs)
Repeats the random numbers after a given time (periodic)
-Fast and deterministic
-Useful in producing repeatable set of random numbers
, True Random Number Generators - CORRECT ANSWER - (TRNGs)
Generates a true random number and uses some form of random process
-Movements of a mouse
-Pauses between keystrokes
-Slow, but non-deterministic
Frequency Analysis - CORRECT ANSWER - Cipher cracking methodology that involves
identifying patterns and variations in the probability of codes
-3 letter code seen often at the beginning of sentences? Might be 'The'
Entropy - CORRECT ANSWER - Measures level of unpredictability - uncertainty in the
encryption process
Encoding Methods - CORRECT ANSWER - ASCII (8-bit, up to 256 characters)
UTF-16 (16-bit, up to 65,536 characters)
What is more efficient - hardware or software encryption? - CORRECT ANSWER -
Hardware
HSM - CORRECT ANSWER - Hardware Security Module
-a tamper-evident and intrusion-resistant physical device that safeguards and manages
cryptographic keys and provides cryptographic processing
TPM - CORRECT ANSWER - Trusted Platform Module
-A dedicated processor that handles hardware-level encryption; allows the use of full disk
encryption on a hard drive in a manner that minimizes the impact on system performance
-Contain encryption keys