Chapter 07: Cryptography and the Public Key Infrastructure Flashcards

1
Q

Which of the following is a Cryptography goal (select all that apply)?
a. Confidentiality
b. Integrity
c. Availability
d. Denial

A

a. Confidentiality
b. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is not a cryptography goal?
a. Confidentiality
b. Availability
c. Nonpedudiation
d. Authentication

A

b. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ______ is a method used to scramble or obfuscate characters to hide their value.

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two primary types of nonmathematical cryptography.

A

Transposition and Substitution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ________ is a type of coding or ciphering system that changes one character or symbol into another.

A

Substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _______ has multiple substitution alphabets for the same message.

A

Polyalphabetic substitution ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which category does Vigenere cipher fit?

A

Polyalphabetic Substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which category does Caesar cipher fit?

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which category does Columnar cipher fit?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ involves scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size and then scrambled.

A

Transposition cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ________ was created by the German government during WW2 to provide secure communications between military and political units.

A

Enigma Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_______ is the art of using cryptographic techniques to embed secret messages within another file.

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ use a shared secret key available to all users of the cryptosystem.

A

Symmetric Cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ uses individual combinations of public/private keys for each user of the system.

A

Asymmetric Cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does obfuscation differ from confidentiality?

A

Obfuscation is the practice of making it intentionally difficult for humans to understand how code works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The recipient of the message simply verifies that the message’s ___________ is valid, ensuring that the message was not altered in transit.

A

digital signature

17
Q

_______ verifies the claimed identity of system users.

A

Authentication

18
Q

________ provides assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender.

A

Nonrepudiation

19
Q

Before a message is put into coded form, it is in _________.

A

Plain Text, represented by P in encryption algorithms.

20
Q

The sender of a message uses cryptographic algorithm to encrypt the plain-text message and produce a __________.

A

cypher text message

21
Q

The _______ is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.

A

Kerchoff

22
Q

What is another name for cryptographic keys.

A

Cryptovariables

23
Q

_______ is the study of methods to defeat codes and ciphers.

A

Cryptanalysis

24
Q

Specific implementations of code or cipher in hardware and software are known as ___________.

A

Cryptosystems

25
Q

Modern ciphers fit into 2 major categories. Name them.

A

Block Ciphers
Stream Ciphers

26
Q

_______ operate on chunks of a message and apply the encryption algorithm to an entire message chunk at the same time.

A

Block Ciphers

27
Q

______ operate on one character or bit of a message at a time.

A

Stream Ciphers

28
Q

Name 5 modes of DES.

A
  • Electronic Cookbook (ECB) mode
  • Cipher Block Chaining (CBC) mode
  • Cipher Feedback (CFB) mode
  • Output Feedback (OFB) mode
  • Counter (CTR) mode
29
Q

DES uses a ______ key.

A

56 bit

30
Q

The simplest and least secure. Each time the algorithm processes a 64-bit block, it simply encrypts the block using the chosen secret key.
a. Electronic Cookbook (ECB) mode
b. Cipher Block Chaining (CBC) mode
c. Cipher Feedback (CFB) mode
d. Output Feedback (OFB) mode
e. Counter (CTR) mode

A

a. Electronic Cookbook (ECB) Mode

31
Q

In ________ mode, each block of unencrypted text is combined with the block of cipher text immediately preceding it before it is encrypted with DES algorithm. This mode also uses an Initialization Vector.
a. Electronic Cookbook (ECB) mode
b. Cipher Block Chaining (CBC) mode
c. Cipher Feedback (CFB) mode
d. Output Feedback (OFB) mode
e. Counter (CTR) mode

A

b. Cipher Block Chaining (CBC) mode

32
Q

Which authentication framework is commonly used for wireless networks?

A

EAP

33
Q

______ is an authentication protocol designed to provide more security than protocols like PAP. This authentication protocol uses an encrypted challenge and three way handshake to send credentials.

A

CHAP

34
Q

What is the name of Microsoft’s authentication protocol which is meant to be alternative of CHAP?

A

MS-CHAP

35
Q

_______ is a password-centric authentication protocol that was commonly used with the Point-to-Point (PPP) protocol.

A

Password Authetentication protocol

36
Q

Which authentication protocol is one of the most common for Authentication, authorization, and accounting systems for network devices, wireless networks, and other services. This protocol sends passwords that are obfuscated by a shared secret and MD5 hash.

A

RADIUS

37
Q

Which IEEE standard includes NAC.

A

802.1X

38
Q

______, is a cisco designed extension. It uses tcp traffic to provide AAA services and provides full packet encryption as well as granular command controls, allowing individual commands to be secured as needed.

A

TACACS+

39
Q

_____ designed to operate on untrusted networks and uses authentication to shield its authentication traffic. The users are composed of three main elements: the primary, the instance, and the realms.

A

Kerberos