C836 Ch.5 continued... Flashcards

1
Q

Asymmetric key cryptography?

A

Also known as public key cryptography, this method uses two keys: a public key and a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure Sockets Layer (SSL) protocol ?

A

Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hash functions ?

A

Also referred to as message digests, these functions do not use a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hashes

A

These provide integrity (but not confidentiality) and are used to determine whether the message has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital signature

A

A method of securing a message that involves generating a hash and encrypting it using a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate

A

Created to link a public key to a particular individual; used as a form of electronic identification for that person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificate authority (CA)

A

A trusted entity that handles digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public key infrastructure (PKI)

A

Infrastructure that includes the CAs that issue and verify certificates and the registration authorities (RAs) that verify the identity of the individuals associated with the certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Certificate revocation list (CRL)

A

A public list that holds all the revoked certificates for a certain period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data at rest

A

Data that is on a storage device of some kind and is not moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data in motion

A

Data that is moving over a WAN or LAN, a wireless network, over the internet, or in other ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data at rest

A

This type of data is protected using data security (encryption) and physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data in motion

A

This type of data is best protected by protecting the data itself (using SSL, TLS) and protecting the connection (using IPsec VPN, SSL VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data in use

A

This type of data is the hardest to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

A subset of cryptography that refers specifically to the transformation of unencrypted data into its encrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decryption

A

The process of recovering the plaintext message from the ciphertext