Chapter 4 Flashcards

1
Q

Which of the following is NOT a method for strengthening a key?

Randomness

Cryptoperiod

Length

Variability

A

Variability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

Electronic Code Book (ECB)

Galois/Counter (GCM)

Counter (CTR)

Cipher Block Chaining (CBC)

A

Cipher Block Chaining (CBC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What entity calls in crypto modules to perform cryptographic tasks?

Certificate Authority (CA)

OCSP Chain

Intermediate CA

Crypto service provider

A

Crypto service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Encrypted signatures

Session keys

Digital certificates

Digital digests

A

Session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is considered the strongest cryptographic transport protocol?

TLS v1.2

TLS v1.0

SSL v2.0

SSL v2.0

A

TLS v1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The strongest technology that would assure Alice that Bob is the sender of a message is a(n).

digital signature

encrypted signature

digest

digital certificate

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A digital certificate associates.

a user’s public key with his private key

the user’s identity with his public key

a user’s private key with the public key

a private key with a digital signature

A

the user’s identity with his public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital certificates can be used for each of these EXCEPT.

to verify the authenticity of the Registration Authorizer

to encrypt channels to provide secure communication between clients and servers

to verify the identity of clients and servers on the Web

to encrypt messages for secure email communications

A

to verify the authenticity of the Registration Authorizer(?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An entity that issues digital certificates is a .

certificate signatory (CS)

digital signer (DS)

certificate authority (CA)

signature authority (SA)

A

certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A centralized directory of digital certificates is called a(n).

Digital Signature Permitted Authorization (DSPA)

Digital Signature Approval List (DSAP)

Certificate Repository (CR)

Authorized Digital Signature (ADS)

A

Certificate Repository (CR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

performs a real-time lookup of a digital certificate’s status.

Certificate Revocation List (CRL)

Real-Time CA Verification (RTCAV)

Online Certificate Status Protocol (OCSP)

CA Registry Database (CARD)

A

Online Certificate Status Protocol (OCSP),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

Algorithm

Initialization vector (IV)

Nonce

Salt

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which digital certificate displays the name of the entity behind the website?

Online Certificate Status Certificate

Extended Validation (EV) Certificate

Session Certificate

X.509 Certificate

A

Extended Validation (EV) Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which trust model has multiple CAs, one of which acts as a facilitator?

Bridge

Hierarchical

Distributed

Web

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement is NOT true regarding hierarchical trust models?

It is designed for use on a large scale.

The root signs all digital certificate authorities with a single key.

It assigns a single hierarchy with one master CA.

The master CA is called the root.

A

It is designed for use on a large scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public key infrastructure (PKI).

generates public/private keys automatically

creates private key cryptography

is the management of digital certificates

requires the use of an RA instead of a CA

A

is the management of digital certificates

17
Q

A(n)is a published set of rules that govern the operation of a PKI.

signature resource guide (SRG)

enforcement certificate (EF)

certificate practice statement (CPS)

certificate policy (CP)

A

certificate policy (CP)

18
Q

Which of these is NOT part of the certificate life cycle?

Expiration

Revocation

Authorization

Creation

A

Authorization

19
Q

refers to a situation in which keys are managed by a third party, such as a trusted CA.

Key authorization

Key escrow

Remote key administration

Trusted key authority

A

Key escrow

20
Q

is a protocol for securely accessing a remote computer.

Transport Layer Security (TLS)

Secure Shell (SSH)

Secure Sockets Layer (SSL)

Secure Hypertext Transport Protocol (SHTTP)

A

Secure Shell (SSH)