Chapter 4 Flashcards
Which of the following is NOT a method for strengthening a key?
Randomness
Cryptoperiod
Length
Variability
Variability
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?
Electronic Code Book (ECB)
Galois/Counter (GCM)
Counter (CTR)
Cipher Block Chaining (CBC)
Cipher Block Chaining (CBC)
What entity calls in crypto modules to perform cryptographic tasks?
crypto service provider
__________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
session keys
Which of these is considered the strongest cryptographic transport protocol?
TLS v1.2
TLS v1.0
SSL v2.0
SSL v2.0
TLS v1.2
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) __________.
digital certificate
A digital certificate associates __________.
a user’s private key with the public key
Digital certificates can be used for each of these EXCEPT __________.
to verify the authenticity of the Registration Authorizer
to encrypt channels to provide secure communication between clients and servers
to verify the identity of clients and servers on the Web
to encrypt messages for secure email communications
to verify the authenticity of the Registration Authorizer
An entity that issues digital certificates is a __________.
certificate authority (CA)
A centralized directory of digital certificates is called a(n) __________.
Certificate Repository (CR)
__________ performs a real-time lookup of a digital certificate’s status.
Online Certificate Status Protocol (OCSP)
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?
Salt
Which digital certificate displays the name of the entity behind the website?
Extended Validation (EV) Certificate
Which trust model has multiple CAs, one of which acts as a facilitator?
Bridge
Which statement is NOT true regarding hierarchical trust models?
It is designed for use on a large scale.
The root signs all digital certificate authorities with a single key.
It assigns a single hierarchy with one master CA.
The master CA is called the root.
It is designed for use on a large scale.