CH2 Flashcards

1
Q

A set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of public and private keys.

A

Public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The study of the techniques used for encryption and secure communications

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The study of how to crack encryption algorithms or their implementations

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A set of rules, which can also be called an algorithm, about how to perform encryption or decryption.

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 common methods that ciphers use

A

Substitution, Polyalphabetic, Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of cipher substitutes one character for another

A

Substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This type of cipher substitutes one character for another but uses multiple alphabets and switches between them by some trigger character in the encoded message

A

Polyalphabetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This cipher method uses many different options, including the rearrangement of letters.

A

Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The instructions for how to reassemble

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A symmetric key cipher (same key used to encrypt and decrypt) that operates on a group of bits called a block.

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List 5 examples of block cipher algorithms

A

AES, 3DES, Blowfish, DES, IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A symmetric key cipher where the plaintext data to be encrypted is done a bit at a time against the bits of the key stream.

A

Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of encryption algorithm is faster to use and requires less CPU … Symmetric or Assymmetric?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the minimum recommended key length for a symmetric encryption algorithm to be considered safe?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an example of an asymmetric algorithm?

A

public key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List 5 examples of asymmetric algorithms

A

RSA, DH, ElGamal, DSA, ECC

17
Q

A method used to verify data integrity

A

Hashing

18
Q

It is not possible to generate the same hash from a different block of data. This is referred to as….

A

collision resistance

19
Q

What are the 3 most popular types of hashes

A

MD5, SHA-1, SHA-2(224 - 512 bits)

20
Q

Attack that attempts to find two input strings of a hash function that produce the same hash result

A

collision attack

21
Q

Hashing mechanism that includes in its calculation a secret key of some type thus, only the other party who also knows the secret key can calculate the resulting hash correctly.

A

HMAC

22
Q

What is the NIST recommended HMAC function.

A

HMAC-SHA-1

23
Q

In the world of cryptography, a digital signature provides 3 core benefits:

A

Authentication, Data Integrity, Nonrepudiation

24
Q

The U.S. government selected and recommended a set of cryptographic standards call Suite B because it has been approved for protecting classified information at both the secret and top secret levels. List the Suite B algorithms

A

ECC, AES GCM, ECC DSA, SHA-256, SHA-384, SHA-512

25
Q

Contains the public key of the CA server and the other details about the CA server.

A

Root Certificate

26
Q

Similar to a root certificate, but describes the client and contains the public key of an individual host.

A

Identity Certificate

27
Q

A series of standards focused on directory services and how those directories are organized. Many popular network operating systems have been based on this, including active directory. This includes directory elements such as (CN=Thor, OU=engineering).

A

X.500

28
Q

This is a format of a certificate request sent to a CA that wants to receive its identity certificate. This type of request would include the public key for the entity desiring a certificate.

A

PKCS # 10

29
Q

This is a format that can be used by a CA as a response to a PKCS #10 request. The response itself will very likely be the identity certificate that had been previously requested

A

PKCS #7

30
Q

The RSA cryptography standard

A

PKCS #1

31
Q

A format for storing both public and private keys using a symmetric password-based key to “unlock” the data whenever the key needs to be used or accessed.

A

PKCS # 12

32
Q

Diffie-Hellman key exchange

A

PKCS #3

33
Q

Cisco and a few other vendors developed this protocol which can automate most of the process for requesting and installing an identity certificate.

A

SCEP (Simple Certificate Enrollment Protocol)

34
Q

What are the 3 basic ways to check whether a certificate has been revoked?

A

CRL (certificate revocation list), OCSP (online certificate status protocol), AAA