History of cryptography Cryptography Definitions and Concepts Remote Access Miscellaneous
100
What is a substitution cipher?
With this type of cipher, each character in a message is replaced with another character.
100
What is a cryptosystem?
A system or product that provides encryption and decryption is referred to as this.
100
What is a vulnerability?
This is a weakness and there is potential that someone will identify this weakness and use it against you.
100
What is a virtual private network (VPN)?
This allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure such as the Internet or service provider backbone network.
200
What is a scytale cipher?
This was a system of encrypting information in which a message was written on a sheet of papyrus that was wrapped around a wooden rod, which was then delivered and wrapped around
a different rod by the recipient. The message was only readable if it was wr
200
What is an algorithm?
This is the set of rules that dictates how enciphering and deciphering take place.
200
What is a risk analysis?
This should be conducted to identify the vulnerabilities and threats and calculate the business impact of each threat.
200
What is a site-to-site VPN?
In these, customer user data traffic is either tunneled between Customer Edge (CE) devices or between Service Provider Edge (PE) devices.
300
What is the Enigma Machine?
This was the most famous cipher machine during World War II. It had separate rotors, a plug board, and a reflecting rotor.
300
What is a keyspace?
When the algorithm needs to generate a new key, it uses random values from this, which is a range of values that can be used to construct a key.
300
What is natural access control?
This is the guidance of people entering and leaving a space by the placement of doors, fences, lighting, and even landscaping.
300
What is IPSEC?
This consists of a suite of protocols designed to protect IP traffic between security gateways or hosts as it transits an intervening network.
400
What is the Vigenere cipher?
This cipher has 27 shift alphabets and the letters are shifted up only one place
400
What is the strength of an encryption method?
This comes from the algorithm, the secrecy of the key, the length of the key, the initialization vectors, and how they all work together within the cryptosystem.
400
What is natural surveillance?
The goal of this is to make criminals feel uncomfortable by providing many ways observers could potentially see them, and make all other people feel safe and comfortable, by providing an open and well-designed environment.
400
What is Point-to-Point Tunneling Protocol (PPTP)?
This is a protocol that was developed by a consortium of vendors, including Microsoft, 3Com, and Ascend Communications. This allows the tunneling of remote access client PPP
frames between a NAS and a VPN gateway/concentrator. It also allows a tunnel
to b
500
What is atbash?
This Hebrew cryptographic method required the alphabet to be flipped so each letter in the original alphabet was mapped to a different letter in the flipped, or shifted, alphabet.
500
What is plaintext?
Once this is transformed into ciphertext, neither human nor machine can properly process it until it is decrypted.
500
What is "power protection"?
This can be done in three ways: through UPSs, power line conditioners, and backup sources.
500
What is an Extranet VPN?
This type of VPN allows connectivity between organizations such as business partners or a business and its customers.






Test 3 Review - Physical Security, Cryptography, & Remote Access

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline