WGU D334, Shawns study guide questions with
correct answers
Encryption/Decryption
changing plaintext into ciphertext / changing it back
| | | | | | |
should be applied to information you want to protect at rest as well as in transit
| | | | | | | | | | | | | | |
Aescrypt
Encrypt individual files
| |
Bitlocker and FileVault | |
encrypt full disks | |
Mono-alphabetic code or substitution | | |
Single mapping from alphabet to cipher alphabet
| | | | | |
polyalphabetic code |
Mapping of alphabet to multiple cipher alphabets
| | | | | |
One-time pad |
Unbreakable encryption. only uses its cipher code once
| | | | | | |
Pseudo-random number generators (PRNGs) | | |
This method repeats the random numbers after a given time (periodic). They are
| | | | | | | | | | | | |
fast and are also deterministic and are useful in producing a repeatable set of
| | | | | | | | | | | | | |
random numbers. |
True Random number generators (TRNGs)
| | | |
This method generates a true random number and uses some form of random
| | | | | | | | | | | | |
process. One approach is to monitor the movements of a mouse pointer on a
| | | | | | | | | | | | | |
screen or from the pauses between keystrokes. Overall, the method is generally
| | | | | | | | | | | |
, slow, especially if it involves human interaction, but is non-deterministic and
| | | | | | | | | | |
aperiodic.
Frequency analysis |
Cipher cracking methodology that involves identifying patterns and variations in
| | | | | | | | | |
the probability of codes.
| | |
Entropy
measures level of unpredictability | | |
Hardware Security Module (HSM) | | |
a tamper-evident and intrusion-resistant physical device that safeguards and
| | | | | | | | |
manages cryptographic keys and provides cryptographic processing
| | | | | |
Trusted platform module (TPM)
| | |
A dedicated processor that handles hardware-level encryption; allows you to
| | | | | | | | | |
encrypt data on your device
| | | |
Pigpen
mono-alphabetic substitution cipher that makes use of mapping plaintext | | | | | | | | |
characters to graphical characters rather than to alphabetic ones.
| | | | | | | |
Rail code |
Employs a method to scramble text by writing it in a sequence across a number
| | | | | | | | | | | | | | |
of rails.
|
BIFID
Makes use of a grid and which maps the letters into numeric values.
| | | | | | | | | | | |
Playfair
5 × 5 matrix containing the alphabet less the letter J. Cipher/decipher process
| | | | | | | | | | | | |
consists of a set of rules outlining use of column and row combinations.
| | | | | | | | | | | |
Morse Code |
correct answers
Encryption/Decryption
changing plaintext into ciphertext / changing it back
| | | | | | |
should be applied to information you want to protect at rest as well as in transit
| | | | | | | | | | | | | | |
Aescrypt
Encrypt individual files
| |
Bitlocker and FileVault | |
encrypt full disks | |
Mono-alphabetic code or substitution | | |
Single mapping from alphabet to cipher alphabet
| | | | | |
polyalphabetic code |
Mapping of alphabet to multiple cipher alphabets
| | | | | |
One-time pad |
Unbreakable encryption. only uses its cipher code once
| | | | | | |
Pseudo-random number generators (PRNGs) | | |
This method repeats the random numbers after a given time (periodic). They are
| | | | | | | | | | | | |
fast and are also deterministic and are useful in producing a repeatable set of
| | | | | | | | | | | | | |
random numbers. |
True Random number generators (TRNGs)
| | | |
This method generates a true random number and uses some form of random
| | | | | | | | | | | | |
process. One approach is to monitor the movements of a mouse pointer on a
| | | | | | | | | | | | | |
screen or from the pauses between keystrokes. Overall, the method is generally
| | | | | | | | | | | |
, slow, especially if it involves human interaction, but is non-deterministic and
| | | | | | | | | | |
aperiodic.
Frequency analysis |
Cipher cracking methodology that involves identifying patterns and variations in
| | | | | | | | | |
the probability of codes.
| | |
Entropy
measures level of unpredictability | | |
Hardware Security Module (HSM) | | |
a tamper-evident and intrusion-resistant physical device that safeguards and
| | | | | | | | |
manages cryptographic keys and provides cryptographic processing
| | | | | |
Trusted platform module (TPM)
| | |
A dedicated processor that handles hardware-level encryption; allows you to
| | | | | | | | | |
encrypt data on your device
| | | |
Pigpen
mono-alphabetic substitution cipher that makes use of mapping plaintext | | | | | | | | |
characters to graphical characters rather than to alphabetic ones.
| | | | | | | |
Rail code |
Employs a method to scramble text by writing it in a sequence across a number
| | | | | | | | | | | | | | |
of rails.
|
BIFID
Makes use of a grid and which maps the letters into numeric values.
| | | | | | | | | | | |
Playfair
5 × 5 matrix containing the alphabet less the letter J. Cipher/decipher process
| | | | | | | | | | | | |
consists of a set of rules outlining use of column and row combinations.
| | | | | | | | | | | |
Morse Code |