Chapter 2 Missed Questions Flashcards
What is Asymmetric encryption?
Encryption and decryption use different keys from the same pair
What is Symmetric encryption?
Encryption and decryption use the same secret keys
What are ephemeral keys?
Keys that can only be used once
What are stream ciphers?
Ciphers that operate on one character or bit of a message at a time
What are block ciphers?
Ciphers that operate on large segments of the message at the same time
What is a transposition chipher?
Ciphers that rearrange the characters in a message
What are some popular Symmetric cryptography encryption algorithms?
DES, 3DES, AES, Blowfish, Twofish an RC4
What are some popular Asymmetric cryptography encryption algorithms?
RSA, PGP, and GnuPG
What Symmetric cryptography encryption algorithms are no longer used today?
DES, 3DES, Blowfish, and RC4
What are the approved DSS (Digital Signature Standards) Encryption Algorithms?
DSA, RSA and ECDSA
What standard governs the structure and content of digital certificates?
X.509
What is the most effective method of revoking digital certificates?
OCSP (Online Certificate Status Protocol)
What is certificate stapling?
A technology that allows web servers to attach an OCSP validation to the certificate they send to users
What is another name for a session key?
Ephemeral Key
Is SSL or TLS the more secure transport encryption technology?
TLS, SSL is no longer used because it is considered insecure, as well as TLS 1.1 and TLS 1.2. TLS 1.3 is the current transport encryption technology.
What is the metric used to provide the best measure of effectiveness in a biometric system?
CER (Crossover Error Rate)
What are the acronyms FRR, FAR, and CER used for in measuring effectiveness? How are they calculated?
FRR is the False Rejection Rate, FAR is the False Acceptance Rate and CER is the Crossover Error Rate.
FRR = Times an Authorized User is Rejected.
FAR = Times an Unauthorized User is Accepted.
CER = Rate at which the FRR and FAR are equal.
What is Zigbee?
A short-range wireless networking technology designed specifically for use in home automation technologies.
What software development methodology uses four stages in an iterative process?
Spiral
What phase of the capability maturity model introduces the reuse of code across projects?
Repeatable
What component of a change management programs includes final testing that the software functions properly?
Release Management
What is federation?
The term for policies, protocols, and practices to manage identities across systems and organizations
What is composed of two doors closely spaced that require the user to use a card to get through one and then the other sequentially?
An access control vestibule
What are common constraints for specialized and embedded systems?
Limitations on power, compute capacity, network throughput and bandwidth, cryptography, and cost. Additional issues with authentication and trust can also be driving factors.