B3P4 - Security Flashcards

1
Q

asymmetric encryption

A

encryptionKey != decryptionKey;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

asymmetric keys

A

encryptWithPublicKey and decryptWithPrivateKey;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

authentification

A

checking that nominalSender = actualSender;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

confidentiality

A

checking that messageContent is only visible to intendedRecipient;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cryptography

A

design of algorithms for secureDataComms;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Diffie-Hellman (DH) algorithm

A

enables eachParty to locally generate an identicalSecretKey without exchanging it;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

encapsulating security payload (ESP)

A

a combination of algorithms providing integrity, authentification, and confidentiality;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

file transfer protocol (FTP)

A

layer 4 [transport] protocol for file transfer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hash

A

hashFunction(message) = aHash;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hash function

A

a mathFunction returning aHash to check messageIntegrity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

integrity

A

ensuring message can’t be changed in transit;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

internet key exchange (IKE) (IPsec VPN)

A

a protocol establishing a secureAssociation between endpoints of an IPsec VPN;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP Security (IPsec) protocol

A

a layer 3 [network] protocol for secureDataTransfer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

message digest

A

= aHash;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

public-key algorithm

A

uses asymmetric encryption;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

secure socket layer (SSL)

A

a protocol for secureDataTransfer over IPnets;

17
Q

security association

A

two ends agreeing options for confidentiality, integrity, and authentification;

18
Q

symmetric encryption

A

encryptionKey = decriptionKey;

19
Q

transport mode (IPsec)

A

where IPsec provides security at layer 4 [transport] for layers 4 and above;

20
Q

tunnel mode (IPsec)

A

where IPsec provides security at layer 3 [network] for layers 3 and above;