Chapter 10: Understanding Cryptography and PKI Flashcards

1
Q

Certificate signing request (CSR)

A

Used to request a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certificate revocation list (CRL)

A

Revoked certificates that are cached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Subject Alternative Name (SAN)

A

Multiple domains with different names but owned by same organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Online Certificate Status Protocol (OCSP)

A

Real-time response to validate certificates issued by a CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Message Direct 5 (MD5)

A

128-bit hash
32 hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure Hash Algorithms (SHA)

A

Verifies the integrity of files
SHA-1 - 160-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hash-Based Message Authentication (HMAC)

A

Uses a shared secret key to add randomness to the resulted hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steganography

A

Hide data inside other data or in plain sight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Homomorphic Encryption

A

Allows data to remain encrypted while being processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lightweight Cryptography

A

Smaller devices such as RFID tags, sensor nodes, smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Elliptic Curve Cryptography (ECC)

A

Graphs points on a curve to create keys
Commonly used on low-power devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly