7 - Cryptography and the Public Key Infrastructure Flashcards
Questions 9, 10, 12, 19 and 20 have been removed because they're too long or redundant. We're not here for stories. We're here for answers!
Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt his message? His own? David’s? A shared key? Public or private?
Shared Secret Key
Alan’s team needs to commute using PII data packets, but he doesn’t need access to the underlying data. What tech can the team use to perform these calculations without accessing the data itself?
Homomorphic Encryption
Norm is using full-disk encryption tech to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?
Confidentiality
Brian discovers that a user suspected of stealing info is posting many image files to a message board. What technique might the individual be using to hide the info in those images?
Steganography
True or False: ALL types of cryptographic keys should be kept secret.
False: Public keys used in asymmetric cryptography can be freely shared (and should be utilized to their fullest extent).
What type of cipher operates on one character of text at a time?
Stream Cypher
Vince is choosing a symmetric encryption algorithm for use in his org. He would like to choose the strongest algorithm on the market today. What algorithm will he choose?
Advanced Encryption Standard or AES
[it’s the latest and greatest]
Kevin is configuring a web server to use digital certificates. What tech can he use to allow clients to quickly verify the status of that digital certificate without contacting a remote server?
The Online Certificate Status Protocol (OCSP) can be accessed to verify info
What type of digital certificate provides the greatest level of assurance that the certificate owner is who they claim to be?
Extended Validation (EV)
Which server is almost always offline in a large PKI deployment?
Root Certificate Authorities (CA)
What certificate format is closely associated with Windows binary certificate files?
Personal Exchange Format (PFX) Files
What type of security solution provides a hardware platform for the storage and management of encryption keys?
Hardware Security Modules (HSM)
what type of cryptographic attack attempts to force a user to reduce the level of encryption that they use to communicate with a remote server?
Downgrade Attack
David would like to send Mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?
Mike’s Public Key
When Mike receives a message that David encrypted for him, what key should he use to decrypt the message?
Mike’s Private Key