Encryption
Cryptography
Confidentiality
Integrity
Authentication
100

In a type of on-path attack also called a "downgrade attack," stripping this forces an unwanted HTTP connection.

What is SSL?

100

This hashing algorithm was developed by the NSA & is widely used for data integrity.

What is SHA?

100

Given DES, IDEA, SHA-256, & DSA to encrypt ACRO.txt, Bob cannot use one.

What is RIPEMD?

100
This cryptographically broken hash algorithm developed by Ron Rivest is still widely used.

What is MD5?

100

Alice, who wants to be as secure as possible, is given a choice between PAP & CHAP, so she must choose this one.

What is CHAP?

200

This is the weakest form of WiFi encryption & is no longer considered secure.

What is WEP?

200

This cryptographic authentication technique uses a hash function & a symmetric key.

What is HMAC?

200

Given SHA-512, GPG, NTLM,  & MD5, Alice will choose this one to encrypt ACRO.txt.

What is GPG?

200

Given OTP, 2FISH, NTLM, & SHA-2, Alice must choose the strongest hashing algorithm.

What is SHA-2?

200

Bob will use this most secure authentication protocol option since his wireless connection uses WPA3.

What is EAP?

300

This security measure automatically encrypts all hard drive data.

What is FDE?

300

This open standard is a one-time password system that uses hash-based message authentication codes.

What is HOTP?

300

Alice & Bob are arguing about which is the latest Rivest Cipher, & you settle by saying this.

What is RC6?

300

This replaced LM Hash for Windows, although it is currently disabled by default on most modern machines.

What is NTLM?

300

This protocol that encapsulates EAP in a TLS tunnel was jointly developed by Cisco, Microsoft, & RSA Security.

What is PEAP?

400

This encrypts data as it is written to the drive.

What is an SED?

400

This Boolean logic operation that is widely used in cryptography may be used to combine hashes.

What is XOR?

400

Given IDEA, RC5, AES, & DSA, Alice will choose this since she is required to use asymmetric encryption.

What is DSA?

400

This algorithm was created to replace MD5 & creates a fixed-length 160-bit hash value.

What is SHA-1?

400

This open protocol was developed by Cisco handles AAA services.

What is TACACS+?

500

This chip is an important Windows hardware-based solution that is an integral part of BitLocker drive encryption.

What is TPM?

500

This networking protocol uses shared secret keys & one-way hashing to enable authentication for DNS database updates.

What is TSIG?

500

Given GPG, ECC, 3DES, & RSA, Bob cannot choose this one since he has been told whether or not he can use symmetric encryption.

What is RSA?

500

This was created as a competitor to the SHA family, but has not gained the same level of popularity.

What is RIPEMD?

500

Given LDAP, TACACS+, & RADIUS, Alice must choose the 802.1X solution.

What is RADIUS?