Chapter 13 - PKI and Encryption Protocols Flashcards
Which of the following does not apply to an x.509 certificate?
A. Certificate version
B. The Issuer of the certificate
C. Public key information
D. Owner’s symmetric key
D. In x.509, the owner does not use a symmetric key. All the other answers apply to x.509.
What two items are included in a digital certificate? (Select the two best answers.)
A. User’s private key
B. Certificate Authority’s digital signature
C. The user’s public key
D. Certificate Authority’s IP address
B and C. A digital certificate includes the Certificate Authority’s (CA) digital signature and the user’s public key. A user’s private key should be kept private and should not be within the digital certificate. The IP address of the CA should have been known to the user’s computer before obtaining the certificate.
Rick has a local computer that uses software to generate and store key pairs. What type of PKI implementation is this?
A. Distributed key
B. Centralized
C. Hub and spoke
D. Decentralized
D. When creating key pairs, PKI has two methods: centralized and decentralized. Centralized is when keys are generated at a central server and are transmitted to hosts. Decentralized is when keys are generated and stored on a local computer system for use by that system.
Which of the following is usually used with L2TP?
A. IPsec
B. SSH
C. PHP
D. SHA
A. IPsec is usually used with L2TP. SSH is a more secure way of connecting to remote computers. PHP is a type of language commonly used on the web. SHA is a type of hashing algorithm.
What ensures that a CRL is authentic and has not been modified?
A. The CRL can be accessed by anyone
B. The CRL is digitally signed by the CA
C. The CRL is always authentic
D. The CRL is encrypted by the CA.
B. Certificate revocation lists or CRLs are digitally signed by the certificate authority for security purposes. If a certificate is compromised, it will be revoked and placed on the CRL. CRLs are later generated and published periodically.
Which of the following encryption concepts is PKI based on?
A. Asymmetric
B. Symmetric
C. Elliptical curve
D. Quantum
A. The public key infrastructure, or PKI, is based on the asymmetric encryption concept. Symmetric, elliptical curve, and quantum cryptography are all different encryption schemes that PKI is not associated with.
You are in charge of PKI certificates. What should you implement so that stolen certificates cannot be used?
A. CRL
B. CAD
C. CA
D. CRT
A. You should implement a certificate revocation list or CRL so that stolen certificates, or otherwise revoked or held certificates, cannot be used.
Which of the following are certificate-based authentication mapping schemes? (Select the two best answers.)
A. One to-many mapping
B. One-to-one mapping
C. Many-to-many mapping
D. Many-to-one mapping
B and D. When dealing with certificate authentication, asymmetric systems use one-to-one mappings and many-to-one mappings.
Which of the following network protocols sends data between two computers while using a secure channel?
A. SSH
B. SMTP
C. SNMP
D. P2P
A. SSH, or the secure Shell, enables two computers to send data via a secure channel. SMTP is the Simple Mail Transfer Protocol that deals with e-mail. SNMP is the Simple Network Management Protocol that enables the monitoring of remote systems. P2P is the abbreviated version of peer-to-peer network.
Which of the following protocols uses port 443?
A. SFTP
B. HTTPS
C. SSHTP
D. SSLP
B. Port 443 is used by HTTPS, which implements TLS/SSL for security. SFTP is the Secure File Transfer Program. There are no protocols named SSHTP and SSLP.
Which of the following protocols creates an unencrypted tunnel?
A. L2TP
B. PPTP
C. IPsec
D. VPN
A. In Virtual Private Networks (VPN), Layer Two Tunneling Protocol (L2TP) creates an unencrypted tunnel between two IP addresses. It is usually used with IPsec to encrypt the data transfer. PPTP is the Point-to-Point Tunneling Protocol that includes encryption.
In a public key infrastructure setup, which of the following should be used to encrypt the signature of an e-mail?
A. Private key
B. Public key
C. Shared key
D. Hash
A. A private key should be used to encrypt the signature of an e-mail in an asymmetric system such as PKI. Public keys and shared keys should never be used to encrypt this type of information. A hash is not used to encrypt in this fashion; it is used to verify the integrity of the message.
Two computers are attempting to communicate with the SSL protocol. Which two types of keys will be used? (Select the two best answers.)
A. Recovery key
B. Session key
C. Public key
D. Key card
B and C. In an SSL session, a session key and a public key are used. A recovery key is not necessary unless data has been lost. A key card would be used as a physical device to gain access to a building or server room.
Which layer of the OSI model does IPsec operate at?
A. Data Link
B. Network
C. Transport
D. Application
B. IPsec is a dual mode, end-to-end security scheme that operates at Layer 3, the Network Layer of the OSI model, also known as the Internet Layer within the Internet Protocol Suite. It is often used with L2TP for VPN tunneling among other protocols.
Which layer of the OSI model is where SSL provides encryption?
A. Network
B. Transport
C. Session
D. Application
C. SSL, or the Secure Sockets Layer, and its successor Transport Layer Security (TLS) encrypt segments of network connections that start at the Transport Layer. The actual encryption is done at the Session Layer, and the protocol is known as an Application Layer protocol.