CH10 - Course Quiz Flashcards
Which term refers to a cipher’s underlying mathematical formula?
algorithm
encryption
authentication
hash
algorithm
Which term refers to an encrypted link between SSH processes on two separate computers?
PKI
SSH Tunnel
802.1x
Kerberos
SSH Tunnel
Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it but the intended recipient of the data can descramble it?
authentication
encryption
authorization
nonrepudiation
encryption
Which term refers to a standardized type of file that includes a public key and the digital signature of a trusted third party?
hash
certificate
encryption
password
certificate
When performing a binary XOR (eXclusive OR) calculation with a plaintext value of 0 and a key value of 0, what is the result?
0
1
2
4
0
Which protocol is the tool that programs use to query and change a database used by the Network?
LDAP
EAP
Kerberos
NTP
LDAP (Lightweight Directory Access Protocol)
Which term refers to the result of running plaintext through cipher algorithm using a Key?
key pair
digital signature
plaintext
ciphertext
ciphertext
LDAP uses TCP and UDP Ports 389 by default?
True
False
True
Which authentication method is commonly used for more-secure Wireless Networks?
PPP
EAP-PSK
EAP-TLS
LEAP
EAP-TLS
The Network Time Protocol (NTP) does one thing: it gives you the current time?
True
False
True
You won’t get an HTTPS connection without a good ________ exchange?
hash
token
certificate
ticket
certificate
Authorization means to verify that whoever accesses the data is the person you want accessing the data?
True
False
False
Symmetric-Key Encryption has one serious weakness: anyone who gets a hold of the key can encrypt or decrypt data with it?
True
False
True
Which term is used for data that hasn’t been encrypted yet?
ciphertext
cleartext
cipher
hash
cleartext (Or Plaintext)
Which authentication protocol is used in TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?
MS-CHAP
PPP
TACACS+
Kerberos
Kerberos
Define Authorization and describe the classic scheme that Windows uses for Authorization?
Defines what an Authenticated person “CAN DO” once they are IN.
Windows uses Rights/Permission based Roles to user accounts.
Define Authentication and provide an example of the most classic form of Authentication?
What does it take for a user to “Get In”?
What do you “Need to Get In?
Examples are Usernames/Passwords, others could be Smartcards, Tokens, Biometrics and more.
Describe the concept of Nonrepudiation with TCP/IP and provide an example?
Ensures that no party can deny that he/she took a specific action.
Example is Digital Signatures.
Define Port Authentication?
Port Authentication is the concept of allowing remote user Authentication to a particular point of entry (A Port) to another Network.
AAA = Authentication, Authorization, Accounting is designed for the idea of Port Authentication.
How do modern Web Browsers indicate if the Web Page is Secure?
- The address begins with https://
2. Before the Address Bar there’s a Lock Icon.
When applying the binary math ____________ calculation, a cleartext value of 0 combined with a key value of 1 equals 1, as does a cleartext value of 1 combined with a key value of 0?
XOR (eXclusive OR)
A Windows domain is a group of computers that defers all Authentication to a ___________, a special computer running some version of Windows Server (with the appropriate role installed)?
domain controller
Mircosoft adopted ________ as the Authentication Protocol for all Windows Networks using a domain controller?
Kerberos
__________ defines what an Authenticated person “Can Do” with data?
Authorization