Chapter 10 Flashcards
Any encryption that uses the same key for encryption and decryption is called? A) Encoded Key B) Symmetric Key C) Single Key D) Synthetic Key
B) Symmetric Key encrpytion uses the same key.
RC4 is a(n)\_\_\_\_ cipher A) Block B) Forwarding C) Stream D) Asymmetric
C) RC4 is an Stream Cipher.
In a PKI encryption method, which key encrypts the data? A) Public B) private C) Both D) Depends on who sends the data.
A) You send someone a public key that he or she in turn, uses to encrypt the data. The private key can decrypt data encrypted with the public key.
The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be called \_\_\_\_\_\_? A) PKI B) Authentication C) Locking D) non-repudiation
D) this is the definition of non-repudiation
A hash function is by definition a \_\_\_\_\_\_\_\_? A) Complex Function B) PKI function C) One-Way Function D) systematic Function
C) Hash functions must be one-way. They should be complex but complexity is not a requirement.
Which of the following is a common hash function? A) SHA-3 B) RC4 C) AES D) BMX
A) Of the choices listed, Only SHA-3 is a hash function.
In order to have PKI you must have a(n)\_\_\_\_\_? A) web server B) Web of Trust C) Root Authority D) Unsigned Certificate
C) A PKI must have a root authority.
Which type of access control requires a label to define its sensitivity? A) MAC B) DAC C) RBAC D) VAC
A) (MAC) Mandatory Access Control must use a label to define sensitivity.
If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running? A) PPP B) RADIUS C) MS-CHAP D) TACACS+
B) RADIUS uses UDP ports 1812 and 1813.
Which authentication standard is highly time sensitive? A) PAP B) RADIUS C) 802.1X D) Kerberos
D) All Kerberos tickets are timestamped.
A(n) \_\_\_\_ defines a user's access to a resource based on the roles the user plays in the network environment? A) MAC B) DAC C) RBAC D) VAC
C) A RBAC defines a user’s access to a resource based on the roles the user plays in the network environment.
A(n)\_\_\_\_\_ is based on the idea that a reasource has an owner who may at his or her discretion assign access to that resource. A) MAC B) DAC C) RBAC D) VAC
B) A DAC is based on the idea that a reasource has an owner who may at his or her discretion assign access to that resource.
Which authentication offers more security? A) PAP B) CHAP C) MS-CHAP D) PPP
C) MS-CHAMP offers the most secruity.
What port do Kerberos use by default? A) 80 B) 88 C) 90 D) 98
B) 88. Kerberos uses UDP or TCP port 88 by default.
What port does SFTP use? A) 23 B) 20 C) 21 D) 22
A) 23. SFTP uses TCP port 23.