Ch 6,7,8 Flashcards
What is the main weakness of a hierarchical trust model?
The structure depends on the integrity of the root CA.
How does a subject go about obtaining a certificate from a CA?
In most cases, the subject generates a key pair then adds the public key along with subject information and
certificate type in a certificate signing request (CSR) and submits it to the CA. If the CA accepts the request, it generates a certificate with the appropriate key usage and validity, signs it, and transmits it to the subject.
What cryptographic information is stored in a digital certificate?
The subject’s public key and the algorithms used for encryption and hashing.
The certificate also stores a digital signature from the issuing CA, establishing the chain of trust.
What does it mean if a certificate extension attribute is marked as critical?
That the application processing the certificate must be able to interpret the extension correctly. Otherwise, it
should reject the certificate
You are developing a secure web application. What sort of certificate should you request to show
that you are the publisher of a program?
A code signing certificate. Certificates are issued for specific purposes. A certificate issued for one purpose
should not be reused for other functions.
What extension field is used with a web server certificate to support the identification of the server
by multiple specific subdomain labels?
The subject alternative name (SAN) field. A wildcard certificate will match any subdomain label.
What are the potential consequences if a company loses control of a private key?
It puts both data confidentiality and identification and authentication systems at risk
You are advising a customer about encryption for data backup security and the key escrow services
that you offer. How should you explain the risks of key escrow and potential mitigations?
Escrow refers to archiving the key used to encrypt the customer’s backups with your company as a third party.
The risk is that an insider attack from your company may be able to decrypt the data backups. This risk can be mitigated by requiring M-of-N access to the escrow keys, reducing the risk of a rogue administrator.
What mechanism informs clients about suspended or revoked keys?
Either a published Certificate Revocation List (CRL) or an Online Certificate Status Protocol (OCSP) responder.
What mechanism does HPKP implement?
HTTP Public Key Pinning (HPKP) ensures that when a client inspects the certificate presented by a server or a code-signed application, it is inspecting the proper certificate by submitting one or more public keys to an HTTP browser via an HTTP header.
What type of certificate format can be used if you want to transfer your private key and certificate
from one Windows host computer to another?
PKCS #12 / .PFX / .P12.
What is the difference between authorization and authentication?
Authorization means granting the account that has been configured for the user on the computer system the right to make use of a resource. Authorization manages the privileges granted on the resource. Authentication protects the validity of the user account by testing that the person accessing that account is who she/he says
she/he is.
What steps should be taken to enroll a new employee on a domain network?
Perform checks to confirm the user’s identity, issue authentication credentials securely, assign appropriate
permissions/privileges to the account, and ensure accounting mechanisms to audit the user’s activity
What methods can be used to implement location-based authentication?
You can query the location service running on a device or geolocation by IP. You could use location with the network, based on switch port, wireless network name, virtual LAN (VLAN), or IP subnet.
In what scenario would PAP be considered a secure authentication method?
PAP is a legacy protocol that cannot be considered secure because it transmits plaintext ASCII passwords and has no cryptographic protection. The only way to ensure the security of PAP is to ensure that the endpoints established a secure tunnel (using IPSec, for instance).
True or false? In order to create a service ticket, Kerberos passes the user’s password to the target application server for authentication.
False—only the KDC verifies the user credential. The Ticket Granting Service (TGS) sends the user’s account details (SID) to the target application for authorization (allocation of permissions), not authentication.
A user maintains a list of commonly used passwords in a file located deep within the computer’s directory structure. Is this secure password management?
No. This is security by obscurity. The file could probably be easily discovered using search tools.
Which property of a plaintext password is most effective at defeating a brute-force attack?
The length of the password.