Cryptography Flashcards

Learn cissp

1
Q

If you want confidentiality when sending email message

A

then Encrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If your message must maintain integrity

A

you must hash the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If your message needs authentication, integrity and/or nonrepudiation.

A

You should digitally sign the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If your message requires confidentiality, integrity, authentication, and
nonrepudiation

A

you should encrypt and digitally sign the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Algorithm Operates on 64-bit blocks of text has variable-length keys ranging from a relatively
insecure 32 bits to an extremely strong 448 bits.

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The AES cipher allows the use of three key strengths

A

128-bit keys require 10 rounds of encryption.
192-bit keys require 12 rounds of encryption.
256-bit keys require 14 rounds of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many version PGP is available ?

A

Two version
commercial version
Freeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The commercial version uses
Key exchange ?
Encryption ?
Hashing ?

A

The commercial version uses
RSA for key exchange,
IDEA for encryption/decryption,
and MD5 for message digest production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The freeware
version (based on the extremely similar OpenPGP standard) uses
Key exchange ?
Encryption ?
Hashing ?
A

Diffie-Hellman key
exchange, the Carlisle Adams/Stafford Tavares (CAST) 128-bit encryption/decryption
algorithm, and
the SHA-1 hashing function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

S/MIME has

already been incorporated in a large number of commercial products, including these:

A

Microsoft Outlook and Outlook Web Access
Mozilla Thunderbird
Mac OS X Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The only

public key cryptographic protocol supported by S/MIME.

A

RSA

The protocol supports the AES
and 3DES symmetric encryption algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common permissions restricted by document DRM solutions

A
Reading a file
Modifying the contents of a file
Removing watermarks from a file
Downloading/saving a file
Printing a file
Taking screenshots of file content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many types of Circuit Encryption ?

A

Security administrators use two types of encryption techniques to protect data traveling
over networks:
Link encryption protects
End-to-end encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Link encryption ?

A

Protects entire communications circuits by creating a secure tunnel
between two points using either a hardware solution or a software solution that
encrypts all traffic entering one end of the tunnel and decrypts all traffic entering the
other end of the tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is End-to-end encryption ?

A

End-to-end encryption protects communications between two parties (for example, a
client and a server) and is performed independently of link encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Difference between link encryption and End-to-end encryption

A

Link encryption,
all the data, including the header, trailer, address, and routing data, is also encrypted.
Therefore, each packet has to be decrypted at each hop so it can be properly routed to the
next hop and then re-encrypted before it can be sent along its way, which slows the
routing.
End-to-end encryption does not encrypt the header, trailer, address, and routing
data, so it moves faster from point to point but is more susceptible to sniffers and
eavesdroppers.

17
Q

Examples of Link encryption ?

A

A company with two offices connected via a
data circuit might use link encryption to protect against attackers monitoring at a
point in between the two offices.

18
Q

Example of End-to-end encryption

A
Secure Shell (SSH) is a good example of an end-to-end encryption technique.
Use of TLS to protect communications between a user and a web server.
19
Q

Note

A

When encryption happens at the higher OSI layers, it is usually end-to-end encryption,
and if encryption is done at the lower layers of the OSI model, it is usually link
encryption.

20
Q

IPsec

A

architecture that supports secure
communications is the Internet Protocol Security (IPsec) standard.

IPsec is a standard
architecture set forth by the Internet Engineering Task Force (IETF) for setting up a
secure channel to exchange information between two entities.

21
Q

Which cryptography IPsec uses to provide encryption, access control, nonrepudiation,
and message authenticatio ?

A

IPsec uses public key cryptography to provide encryption, access control, nonrepudiation,
and message authentication, all using IP-based protocols. The

22
Q

Use of IPsec ?

A

The primary use of IPsec is for
virtual private networks (VPNs), so IPsec can operate in either transport or tunnel mode.
IPsec is commonly paired with the Layer 2 Tunneling Protocol (L2TP) as L2TP/IPsec.

23
Q

Wired Equivalent Privacy ?

A

Wired Equivalent Privacy (WEP) provides 64- and 128-bit
encryption options to protect communications within the wireless LAN. WEP is described
in IEEE 802.11 as an optional component of the wireless networking standard.

24
Q

Note about WEP

A

In fact, the use of WEP encryption on a store network was the root
cause behind the TJX security breach that was widely publicized in 2007. Again, you
should never use WEP encryption on a wireless network.

25
Q

WiFi Protected Access

A

WiFi Protected Access (WPA) improves on WEP encryption by
implementing the Temporal Key Integrity Protocol (TKIP), eliminating the cryptographic
weaknesses that undermined WEP. A further improvement to the technique, dubbed
WPA2, adds AES cryptography. WPA2 provides secure algorithms appropriate for use on
modern wireless networks.

26
Q

Note About WAP

A

Remember that WPA does not provide an end-to-end security solution. It encrypts
traffic only between a mobile computer and the nearest wireless access point. Once
the traffic hits the wired network, it’s in the clear again.

27
Q

Other commonly used Wireless security standard ?

A

Another commonly used wireless security standard, IEEE 802.1x, provides a flexible
framework for authentication and key management in wired and wireless networks.
use 802.1x, the client runs a piece of software known as the supplicant