Cryptography (DS1-DS3)
Symmetric vs Asymmetric Encryption DS4&DS5
Hashing&Digital Signatures and Secure Protocol(DS6&DS7
Key Management,PKI, and Access Control,Authentication DS8,DS9 & DS10
Data At Rest, Data In Motion,Data in use DS11
100

Encryption is classified as what type of control?

Technical

100

What distinguishes the Vigenere cipher from Ceaser cipher ?

It is polyalphabetic and uses a text key

100

Digital signatures provided:  

Authentication, integrity, and non-repudiation 

100

Authentication verifies 

Who you are

100

Data-at-rest resides?

On storage media 

200

Which of the following is a threat to data integrity?

Unauthorized modification of data by malware

200

The study of breaking cryptographic systems is called?

Cryptanalysis 

200

Which algorithm is commonly used for secure key exchange, but does not encrypt data?  

Diffie-Hellman

200

Which of the following is not an authentication factor?

Something you wish

200

Which is not a valid state of data?

Data-in-Backup

300

Which of the following best describes cryptography?

The discipline that provides confidentiality, integrity, and authenticity 

300

In symmetric cryptography, what is true about the key?

the same key encrypts and decrypts 

300
A hash function produces 

Fixed-length output from any input 

300

Which hardware device improves PKI security? 

Hardware Security Module (HSM)

300

Which mechanism protects data-in-motion

TLS or VPN

400

which security property ensures that information is not disclosed to unauthorized individuals?

confidentiality  

400

In symmetric cryptography, what is true about the key?

Kerckhoff's principle

400

Which of the following is not a property of a secure hash function?

Reversible 

400

What is the final step in the key lifecycle?

Key destruction 

400

Which security control helps protect data-in-use?

Endpoint detection and response (EDR)

500

A cipher that shifts each letter three positions in the alphabet is known as??

Caesar Cipher

500

What is the main limitation of symmetric encryption? 

Key distribution and management 

500

Which hardware devices improve PKI security and performance?

Hardware Security Module (HSM)

500

Which sequence best represents the IAAA process?

Identification - Authentication - Authorization - Accountability 

500

What describes a data breach?

Unauthorized access, disclosure, or compromise of data 

M
e
n
u