Chapter 10: Understanding Crptography and PKI Flashcards

1
Q

What is Integrity?

A

Ensures data has not been altered or tampered with intentionally or accidentally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hash?

A

A fixed-length output (digest) created from data using a one-way algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confidentiality?

A

Ensures that only authorized users can access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Encryption?

A

The process of converting readable data into an unreadable format to protect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Symmetric Encryption?

A

An encryption method where the same key encrypts and decrypts data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Stream Cipher?

A

Encrypts data one bit or byte at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Block Cipher?

A

Encrypts data in fixed-size chunks (blocks), usually 64 or 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Asymmetric Encryption?

A

Uses a public key to encrypt and a private key to decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Steganography ?

A

Hides data within other data so it’s not noticeable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Non-repudiation?

A

Ensures a sender cannot deny having sent a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authentication?

A

Verifies the identity of a user, device, or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hashing?

A

One-way function that coverts data into a fixed-sized string (hash).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Checksum?

A

A value calculated from a data set to detect errors or changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Message Digest 5 (MD5)?

A

A widely used hash function producing a 128-bit hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Secure Hash Algorithm (SHA)?

A

A family of cryptographic hash functions designed by the NSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SHA-0?

A

The original version of SHA, published in 1993 but withdrawn due to flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is SHA-1?

A

Produces a 160-bit hash; used in SSL/TLS, but now considered weak.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SHA-2?

A

Includes SHA-224, SHA-256, SHA-384, and SHA-512. Widely used today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is SHA-3?

A

A different structure from SHA-2 and designed for future-proofing in case SHA-2 is broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Hash-based Authentication Code (HMAC)?

A

A hash function combined with a secret key to verify message integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is HMAC-MD5?

A

HMAC that uses MD5 as the underlying hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is HMAC-SHA-256?

A

Combines a message, a secret key, and SHA-256 to ensure data integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The hash of a file will always be the same no matter how many times you calculate it using the same hashing algorithm?

A

This is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What if an attacker changes both the message and sends a modified hash?

A

HMAC protects against this, because the secret key is unknown to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are Hash Collisions?

A

When two different inputs product the same hash output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an Online Password Attack?

A

When an attacker tries to log in repeatedly through a live system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is an Offline Password Attack?

A

Attacker has access to stolen password hashes and brute-forces them locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Dictionary Attack?

A

Attempts passwords from a pre-compiled list of common words and phrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a Brute Force Attack?

A

Tries every possible combination until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Password Spraying Attack?

A

Tries a few common passwords against many accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a Pass the Hash Attack?

A

Attacker uses a stolen hashed password to authenticate without cracking it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a Birthday Attack?

A

An attack that exploits the probability of hash collisions based on the birthday paradox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the Birthday Paradox?

A

In cryptography, shows that hash collisions are more likely than expected. For an n-bit hash, a collision can occur in about 2^(n/2) attempts, not 2^n. This highlights the need for stronger hash functions to resist collision attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a Rainbow Table Attack?

A

Uses a pre-computed table of hashes for common passwords to reverse hashes quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Salting?

A

Adding a random string (salt) to each password before hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Key Stretching?

A

Strengthens weak passwords by increasing the time it takes to hash them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Bcrypt?

A

A key stretching and salting algorithm for securely hashing passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is PBKDF2?

A

A key stretching algorithm that strengthens passwords against brute-force attacks by using a password, salt, and multiple iterations to derive a cryptographic key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Argon2?

A

Designed to resist GPU/ASIC attacks by using memory-hard functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the Blowfish block cipher?

A

A symmetric-key block cipher with a 64-bit block size and a key length up to 448 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Data at rest?

A

Data that is stored on a device or backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is Data in use?

A

Data that is actively being processed or accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the two primary encryption methods?

A

Symmetric and Asymmetric?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the two elements in an encryption method?

A

A key and the algorithm.

45
Q

What is Asymmetric Encryption?

A

Uses a pair of keys for encryption and decryption: a private key and a public key.

46
Q

What is Symmetric encryption? AKA secret-key encryption and session-key encryption.

A

Uses one secret key for both encryption and decryption.

47
Q

In regards to encryption algorithms, what is the key?

A

A secret value used to encrypt and decrypt data.

48
Q

In regards to encryption algorithms, what is the algorithm itself?

A

The algorithm is the set of rules or procedures that defines how the encryption or decryption happens.

49
Q

What is ROT13?

A

A simple cipher that rotates each letter by 13 positions in the alphabet.

50
Q

What is Obfuscation?

A

Makes code or data harder to read or understand. Not true encryption.

51
Q

What are Block Ciphers?

A

Encrypts data in fixed-sized blocks (e.g. 128 bits at a time).

52
Q

What is the Advanced Encryption Standard (AES)?

A

Widely used in block ciphers —fast, secure, and standard.

53
Q

What are Stream Ciphers?

A

Encrypts data bit-by-bit or byte-by-byte –like a flowing stream. Ideal for real-time use.

54
Q

What are some of the strengths of AES?

A

It’s fast, efficient, and strong.

55
Q

What is the Triple Data Encryption Standard (3DES)?

A

Applies DES three times for extra security. Nonetheless, considered deprecated. Use AES.

56
Q

What is Blowfish?

A

A symmetric block cipher with a 64-bit block size and flexible key length.

57
Q

What is Twofish?

A

Successor to Blowfish, designed to be faster and more secure.

58
Q

What is Key Exchange?

A

The secure sharing of a key between two parties.

59
Q

What are Certificate Authorities (CA)?

A

A trusted organization that issues digital certificates to verify identities online.

60
Q

What are Digital Certificates?

A

A file issued by a CA that confirms the ownership of a public key.

61
Q

What are some common Digital Certificate elements?

A

Serial number, issuer, validity date, subject, public key, key usage, and certification attributes (CN, O, L, S, C).

62
Q

What does Ephemeral mean?

A

Short-lived or temporary, used once and then discarded.

63
Q

What is Perfect Forward Secrecy?

A

A property of secure systems where ephemeral keys are used so that even if one key is compromised, past communications remain secure.

64
Q

What is an Ephemeral Key?

A

A key for one session only, then discarded.

65
Q

What is Elliptic Curve Cryptographic (ECC)?

A

Uses elliptic curves to create small but strong encryption keys.

66
Q

Since encryption algorithms do not change, how are they strengthened?

A

You increase the length of a key.

67
Q

What is Rivest-Shamir-Adleman (RSA)?

A

A widely-used asymmetric encryption algorithm; often used in digital signatures and secure data transmission.

68
Q

What is Audio Steganography?

A

Hides data inside audio files by slightly altering sound data.

69
Q

What is Image Steganography?

A

Hides data in image files, often by changing the least significant bits of pixels.

70
Q

What is Video Steganography?

A

Embeds data in video files using techniques like altering frames or audio.

71
Q

What is Tokenization?

A

Replaces sensitive data with random tokens.

72
Q

What is Masking?

A

Hides parts of sensitive data (e.g. --2315).

73
Q

What is the Digital Signature Algorithm (DSA)?

A

An algorithm used to create digital signature; confirms a message’s integrity and authenticity.

74
Q

What security benefits are achieved if a recipient can decrypt a digital signature?

A

Authentication, Non-repudiation, and Integrity.

75
Q

What is the Secure/Multipurpose Internet Mail Extensions (S/MIME)?

A

A standard for email encryption and digital signing.

76
Q

Are CAs required to support TLS?

77
Q

What is a Downgrade Attack?

A

A cyberattack where a secure connection is forced to use a weaker/older protocol or cipher.

78
Q

What is the Blockchain?

A

A decentralized, immutable ledger of data (blocks) linked using cryptography.

79
Q

What are Open Public Ledgers?

A

A blockchain that anyone can read, write to, or audit.

80
Q

In the context of Cybersecurity, what is Entropy?

A

Randomness or unpredictability in data.

81
Q

In the context of Cybersecurity, what is Predictability?

A

When an attacker can guess or calculate a value.

82
Q

What are Weak Keys?

A

A short/small key (low entropy).

83
Q

In the context of Cybersecurity, what is Longevity?

A

Refers to how long an encryption algorithm or key remains secure.

84
Q

With symmetric encryption, should the same key be reused?

A

No, it makes the algorithm vulnerable to attack.

85
Q

What is a Plaintext Attack?

A

An attacker that has access to unencrypted data that tries to find patterns or infer the encryption method to compromise the system.

86
Q

What is a Chosen-Plaintext Attack?

A

The attacker chooses plaintexts and sees their encrypted outputs, which can help reverse-engineer the encryption algorithm/key.

87
Q

What is a Cipher-only Attack?

A

The attacker only has access to the ciphertext to analyze for patterns to infer the encryption method to compromise the system.

88
Q

What is Public Key Infrastructure (PKI)?

A

A framework of people, policies, and technology to manage digital certificates.

89
Q

What are Intermediate CAs?

A

CAs that site between the root CA and the end-user certificate.

90
Q

What is Certificate Chaining?

A

A chain of trust from the root CA to the end-user certificate via intermediates.

91
Q

What is OpenSSL?

A

An open-source toolkit for implementing SSL/TLS encryption.

92
Q

What are Certificate Singing Requests (CSR)?

A

A request sent to a Certificate Authority (CA) to obtain a digital certificate.

93
Q

What is a Registration Authority (RA)?

A

A trusted entity that verifies user identities before a certificate is issued.

94
Q

What reasons can a CA revoke a certificate?

A

Private key compromise, Change of affiliation, Superseded by another certificate, Cease of operation, Certificate hold, or Certificate holder’s request.

95
Q

What are common issues with Invalid Certificates?

A

They’re expired, Certificate no longer trusted, Certificate Revoked.

96
Q

What is a Certificate Revocation List (CRL)?

A

A list of revoked certificates that are no longer trusted.

97
Q

What is the Online Certificate Status Protocol (OCSP)?

A

A real-time protocol for checking if a certificate is valid or revoked.

98
Q

What is OCSP Stapling?

A

The server “staples” (includes) the OCSP response from the CA with its certificate during the TLS handshake.

99
Q

What is Certificate Pinning?

A

A security technique where a client remembers (pins) a server’s public key or certificate.

100
Q

What is Key Escrow?

A

A trusted third-party that holds a copy of encryption keys for legal or recovery purposes.

101
Q

What is a Key Management System (KMS)?

A

A system used to generate, store, rotate, and destroy encryption keys securely.

102
Q

What are some tasks handled by a KMS?

A

Key generation, Key storage, Key distribution, Key rotation, and Key retirement/revocation/destruction.

103
Q

What are some Certificate Types?

A

Machine/computer, User,Email, Code signing, Self-signed, Root, Wildcard, Subject alternative name (SAN), Domain Validation, and Extended Validation.

104
Q

What are the Certificate formats?

A

Canonical Encoding Rules (CER), Distinguished Encoding Rules (DER), P7B, P12, and Personal Information Exchange (PFX).

105
Q

What is Canonical Encoding Rules (CER)?

A

A set of strict rules for encoding data in Abstract Syntax Notation One (ASN.1).

106
Q

What is Distinguished Encoding Rules (DER)?

A

A binary format for data structures described by ASN.1.

107
Q

What is P7B?

A

Certificate format used to store certificates and certificate chains (but no private keys).

108
Q

What is P12?

A

A binary format for storing the full package: certificate(s) + private key(s).

109
Q

What is Personal Information Exchange?

A

Same as P12 – used interchangeably.