15 D5 Flashcards

1
Q

___ is a popular 1 way hash algorithm used to create digital signatures. Produces an output of 160 bits.

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ are a particular class of hashing algorithm devised to solve the problem of detecting errors in messages transmitted through communication lines. Have small key sizes.

A

Checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CA categories:

__ __ are self-signed and can sign intermediate certifications.

A

Root certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ algorithms use the same key to perform both encryption and decryption

A

Symmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of Certificates:
___ - Contains the public key of a particular CA. They can be what’s called a ‘self-signed’ certificate or signed by another CA.

A

Certificate Authority cert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ supports keys from 0 to 448 and operates in block mode with a block size of 64.

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL Security Features:
___ - Each record is run through a message digest such as MD5. The receiving end reverses the process using the same message using the same message digest to ensure data integrity.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ supports keys from 128, 196, and 256. It operates in block mode with a block size of 128.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ algorithms use 2 keys, public and private, with mathematical relations to each other. If one encrypts, only the other can decrypt and vice versa.

A

Asymmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ produces either 128 bit or 256 bit hash codes. Can run with a variable number of rounds of the internal algorithms.

A

Snefru

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ was developed by IBM to extend the life of the original DES due to limited 56-bit key. There are 2 modes.

A

Triple Data Encryption Standard (3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital Signatures:

___ Key - portion of the key used to sign an email. Is password protected, users should never give their keys to anyone.

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ was designed for 32 bit computers and outputs a 128 bit hash.

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 SSH Authentication methods are:

___ ___ ___

A

.rhosts
.rhosts and RSA
Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ issue digital certificates. Are a trusted 3rd party. The widely used specification/standard is X.509.

A

Certification Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Certificates:

___ - Contains individuals public keys used to verify users identity.

A

Personal cert

17
Q

3DES-__ Uses 3 different keys for an effective key strength of 168 bits; theoretically susceptible to meet-in-the-middle attack.

A

3DES-EEE

18
Q

___ works in a client/server fashion with a suite of encryption technologies to ensure secure communications between client and server.

A

Secure SHell (SSH)

19
Q

SSL Security Features:

___ - Using digital certificate technologies ensures client and server identity.

A

Authentication

20
Q

___ algorithms are hashing functions used to produce hash codes, which are difficult to reverse. Takes input and produces as output of 128 bit fingerprint/message digest.

A

Message Digest (MD) algorithms

21
Q

___ is a variable length 1 way hash function. Processes message in 1024 bit blocks.

A

Haval

22
Q

__ is an integral part of securing DoD/IC networks.

A

Encryption

23
Q

Types of Certificates:
___ - Contains public keys of individuals or vendors representing a program. Used to verify and trust downloaded programs.

A

Publisher cert

24
Q

SSH uses ___ keys to create a secret key shared between client and server.

A

Asymmetric keys

25
Q

___ Exchange was the first practical method for establishing a shared secret over an unprotected communications channel. Not actually a method of encryption and decryption.

A

Diffie-Heilman Key Exchange

26
Q

CA categories:

__ __ provide the authority to sign server, personal publisher, or other intermediate CA’s.

A

Intermediate certificates

27
Q

Server uses it private key to decrypt it. The session key is used by whichever cipher (___) is chosen for the data encryption.

A

symmetric

28
Q

Secure Socket Layer (SSL) is a protocol that provides secure communications through the Web. Was developed by (1)__. Initiated with the (2)__ url prefix. and uses port (3)__.

A

1- developed by Netscape
2- prefix https
3- port 443

29
Q

__ supports keys up to 256 and operates in block mode with a block size of 128.

A

Twofish

30
Q

The ___ algorithm is a cryptosystem for public key encryption and is widely used for securing sensitive data, mainly over insecure networks. Based on multiplying 2 prime large #’s.

A

Rivest-Shamir-Adleman (RSA) Algorithm

31
Q

___ provide verification of temperproof data integrity and that the document originated from the person who signed it. (non-repudiation)

A

Digital signatures

32
Q

Types of Certificates:

___ - Contains public key of a web server using SSL , used to ID a particular web server

A

Server cert

33
Q

3DES-__ Uses 2 of the same keys for encryption and one key for decryption. The decryption key does not truly decrypt the message to plain text.

A

3DES-EDE

34
Q

SSL Security Features:

___ - Data is compressed and encrypted with stream and block encryption cipher.

A

Privacy/ Confidentiality

35
Q

Digital Signatures:

___ Key - portion of the key that is available to other people.

A

Public Key

36
Q

SSH ___ stages ensure client is authorized to connect to the server. 3 possible methods.

A

authentication