7 - Cryptography and the Public Key Infrastructure Flashcards

Questions 9, 10, 12, 19 and 20 have been removed because they're too long or redundant. We're not here for stories. We're here for answers!

1
Q

Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt his message? His own? David’s? A shared key? Public or private?

A

Shared Secret Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alan’s team needs to commute using PII data packets, but he doesn’t need access to the underlying data. What tech can the team use to perform these calculations without accessing the data itself?

A

Homomorphic Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Norm is using full-disk encryption tech to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brian discovers that a user suspected of stealing info is posting many image files to a message board. What technique might the individual be using to hide the info in those images?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: ALL types of cryptographic keys should be kept secret.

A

False: Public keys used in asymmetric cryptography can be freely shared (and should be utilized to their fullest extent).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of cipher operates on one character of text at a time?

A

Stream Cypher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vince is choosing a symmetric encryption algorithm for use in his org. He would like to choose the strongest algorithm on the market today. What algorithm will he choose?

A

Advanced Encryption Standard or AES

[it’s the latest and greatest]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kevin is configuring a web server to use digital certificates. What tech can he use to allow clients to quickly verify the status of that digital certificate without contacting a remote server?

A

The Online Certificate Status Protocol (OCSP) can be accessed to verify info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of digital certificate provides the greatest level of assurance that the certificate owner is who they claim to be?

A

Extended Validation (EV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which server is almost always offline in a large PKI deployment?

A

Root Certificate Authorities (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What certificate format is closely associated with Windows binary certificate files?

A

Personal Exchange Format (PFX) Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of security solution provides a hardware platform for the storage and management of encryption keys?

A

Hardware Security Modules (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what type of cryptographic attack attempts to force a user to reduce the level of encryption that they use to communicate with a remote server?

A

Downgrade Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

David would like to send Mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?

A

Mike’s Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When Mike receives a message that David encrypted for him, what key should he use to decrypt the message?

A

Mike’s Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly