ch 4 Flashcards

1
Q

define key strength

A

primary characteristics that determine the resiliency of the key to attacks, randomness, length of key, crypto period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the different block cypher modes

A

(ECB) Electronic code book
(CBC) cipher block chaining
(CTR) Counter
(GCM) Galois/counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Block cypher mode that each possible block of plaintext has a defined corresponding ciphertext value and vise versa

A

(ECB) electronic code book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

block cipher mode in which a sequence of bits are encrypted as a single unit or blocked with a cipher key applied to the entire block.

A

(CBC)cipher block chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

block cipher mode in which value that is encrypted and given as input to XOR with plaintext which results in cyphertext block

A

(CTR) Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric key that provides both privacy and integrity encryption

A

(GCM) Galois/ Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Generates keys, provides key storage’s implements cryptographic algorithms. can be implemented in software or hardware

A

Crypto service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a value that can be used to ensure that plaintext when hashed, will not consistently result in the same digest.

A

salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

input value that must be unique with some specified scope

A

Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

arbitrary number that can be used along with a secret key for data encryption

A

(IV) Initializing Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

used to prove a document originated from a valid sender. they only show the private key of the sender was used to encrypt the digital sender.

A

digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

used to help solve the problem of verifying identity

A

trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

associated a users identity to a public key

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

responsible for digital certificates

A

(CA) Certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

also known as a (CSR) Certificate signing request.

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the process for the CSR

A

user signs the CSR then sends it to the intermediate CA, intermediate CA verifies the CSR and authenticity. intermediate CA’s process the certificates request, verifies the identity of the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what do you do to ensure the integrity of a Root CA (the beginning stage of a certificate)

A

keep it offline from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

publicly accessible centralized directory of digital certificates can be managed locally by a storage are connected to the CA server

A

(CR) Certificate Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cert is no longer in use details have changed and the private key lost or stolen cert has been revoked

A

certificate revocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

cert serial numbers that have been revoked

A

(CRL) certification revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

performs real time lookup of the certificate status, called a request response protocol

A

(OCSP) Online certificate status protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OCSP where web servers send queries to the OCSP responder server at regular intervals to receive a signal time stamped response.

A

OCSP stapling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are the common digital certs

A

Root cert, domain certs, hardware and software certs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the process of verifying a digital certificate

A

certificate chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
endpoint of the chain of certificate chaining
user digital certificate
26
the beginning of the chain of certificate chaining
root digital certificate
27
performs two primary functions: authenticity of the web server to the client, authenticity of the cryptographic connection to web servers.
domain digital certificates
28
Verifies the identity of the entity that has control over the domain name.
domain validation
29
requires more extensive verification of the legitimacy of the business.
(EV) extended validation
30
used to validate a main domain along with subdomains.
wildcard
31
also known as a unified communications certificate, primarily used for Microsoft exchange servers or unified communications.
(SAN) Subject alternative name
32
division that defines the most widely accepted digital certs
(ITU) Telecommunications Standardization Sector
33
what is the standard certificate
x.509
34
what does BER stand for
basic encoding rules
35
what does CER stand for
cononical encoding rules
36
what does DER stand for
Distinguished encoding rules
37
framework for all entities involved in digital certs
(PKI) Public key Infrastructure
38
what doe the cert management facilitate by PKI
create/ store/ distribute/ revoke
39
confidence or reliance
trust
40
trust relationship between individual and entities
trust model
41
trust model where one person knows the other person
direct trust
42
two individuals trust each other because of the trust of a third party
third party trust
43
assign a single hierarchy with one master CA called the Root.
Hierarchical trust model
44
A single CA private key could be compromised. could also create a significant backlog
trust model limitations
45
multiple CA's sign digital certificates
Distributed trust model
46
One CA acts as a facilitator to interconnect connect all other CA's
bridge trust model
47
governs operations of a PKI
certificate policy (CP)
48
technical document in detail on how the CA uses and manages certs
(CPS) Certificate practice statement
49
occurs after user is positively identified
creation
50
may occur when employee is on a leave of absence
suspension
51
cert is no longer valid
revocation
52
key can no longer be used
expiration
53
public key storage embedded within digital certs, private key on users local system
key management
54
removes all public and private keys and the users identification from the CA.
destruction
55
uses AES, developed by netscape, most common transport algorithms
(SSL) Secure Socket Layer
56
SSLv.3 served as the basis for TLS v1.0, current version is TLS v1.2
(TLS) Transport Layer Security
57
named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS
Cipher suite
58
determined by overall security
length of keys
59
it is a LINUX/UNIX based command interface and protocol. used to access remote computers, can be used for a tool for secure network backups.
(SSH) Secure Shell
60
Common use of TSL and SSL, The secure version is actually “PLAIN” HTTP sent over SSL or TLS. Uses port 443 instead of HTTP’s port 80.
(HTTPS) Hypertext Transport Protocol Secure
61
Secures email messages/ as well as digitally signed email messages.
(S/MIME) Secure/ Multipurpose Internet Main Extensions
62
Provides protection for Voice over IP (VoIP). Adds security features such as messages authentication and confidentiality for VoIP Communications.
(SRTP) Secure Real-Time Transport Protocol
63
Considered to be transparent security protocol, Provides three areas of protection, Authentication, Confidentiality, Key Management. Supports two encryption modes.
(IPsec) IP security
64
Encrypts only the data portion of the packet.
Transport
65
Encrypts both the header and the data portion.
Tunnel