Encryption is classified as what type of control?
Technical
What distinguishes the Vigenere cipher from Ceaser cipher ?
It is polyalphabetic and uses a text key
Digital signatures provided:
Authentication, integrity, and non-repudiation
Authentication verifies
Who you are
Data-at-rest resides?
On storage media
Which of the following is a threat to data integrity?
Unauthorized modification of data by malware
The study of breaking cryptographic systems is called?
Cryptanalysis
Which algorithm is commonly used for secure key exchange, but does not encrypt data?
Diffie-Hellman
Which of the following is not an authentication factor?
Something you wish
Which is not a valid state of data?
Data-in-Backup
Which of the following best describes cryptography?
The discipline that provides confidentiality, integrity, and authenticity
In symmetric cryptography, what is true about the key?
the same key encrypts and decrypts
Fixed-length output from any input
Which hardware device improves PKI security?
Hardware Security Module (HSM)
Which mechanism protects data-in-motion
TLS or VPN
which security property ensures that information is not disclosed to unauthorized individuals?
confidentiality
In symmetric cryptography, what is true about the key?
Kerckhoff's principle
Which of the following is not a property of a secure hash function?
Reversible
What is the final step in the key lifecycle?
Key destruction
Which security control helps protect data-in-use?
Endpoint detection and response (EDR)
A cipher that shifts each letter three positions in the alphabet is known as??
Caesar Cipher
What is the main limitation of symmetric encryption?
Key distribution and management
Which hardware devices improve PKI security and performance?
Hardware Security Module (HSM)
Which sequence best represents the IAAA process?
Identification - Authentication - Authorization - Accountability
What describes a data breach?
Unauthorized access, disclosure, or compromise of data