Cryptography and PKI . Flashcards

1
Q

Forensic investigators must take steps to ensure that they do not accidentally tamper with evidence and that they preserve the _____ of _____ documenting evidence handling from collection until use in court.

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When performing forensic analysis, be certain to observe the _____ of ______ and capture information that is not likely to exist for a long period of time first.

A

Order of Votality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common use cases for encryption include:

  • Providing confidentiality for sensitive information.
  • Confirming the integrity of stored or transmitted information.
  • Authenticating users.

(T/F)?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two basic cryptographic operations?

A
  • Substitution

- Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In terms of cryptographic operations, what is Substitution?

A

Modifies characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In terms of cryptographic operations, what is Transposition?

A

Moves characters around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ encryption uses the same shared secret for encryption and decryption.

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In _______ encryption, users each have their own public/private keypair.

A

Assymetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In asymmetric encryption, in regards to Confidentiality, the Sender Encrypts with the Recipient’s _____ key.

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In asymmetric encryption, in regards to the Digital Signature, the Sender Encrypts with the Sender’s _____ key.

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In asymmetric encryption, in regards to Confidentiality, the Recipient Decrypts with the Recipient’s _____ key.

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In asymmetric encryption, in regards to the Digital Signature, the Recipient Decrypts with the Sender’s _____ key.

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anything encrypted with one key from a pair may only be decrypted with the other key from that same pair (T/F)?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is the formula for which type of cryptography?

n(n-1) / 2 keys

A

Symmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is the formula for which type of cryptography?

2 n keys

A

Asymmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What secure Symmetric Algorithms are there?

A
  • 3DES
  • AES
  • IDEA
  • Twofish
  • Blowfish
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Are DES and RC4 secure?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What asymmetric algorithms are there?

A
  • RSA
  • El Gamal
  • Elliptic Curve (ECC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _____-______ may be used for secure exchange of symmetric keys.

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

______ are one-way functions that produce a unique value for every input and cannot be reversed.

A

Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common hashing algorithms include SHA, HMAC and RIPEMD (T/F)?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The MD5 hashing algorithm is still widely used, but it has significant security vulnerabilities (T/F)?

A

True!

23
Q

What is the replacement for Secure Sockets Layer (SSL) and uses public key cryptography to exchange a shared secret key used to secure web traffic and other network communications.

A

Transport Layer Security (TLS)

24
Q

The ______ ______ _____ (TCB) is the secure core of a system that has a secure perimeter with access enforced by a reference monitor.

A

Trusted Computing Base

25
Q

What are the three Data States?

A
  • Data at Rest
  • Data in Motion
  • Data in Use
26
Q

This Data State…

Stores data on a system or media device.

A

Data at Rest

27
Q

This Data State…

Has data in transit over a network.

A

Data in Motion

28
Q

This Data State…

Has data being actively processed in memory.

A

Data in Use

29
Q

When configuring security for a wireless network, what should you always use?

A

WiFi Protected Access (WPA or WPA2) protocols.

30
Q

Which wireless network is insecure?

A

Wired Equivalent Privacy (WEP) protocol

31
Q

WPA uses the _____ ____ _____ _____ to rapidly change encryption keys.

A

Temporal Key Integrity Protocol (TKIP)

32
Q

WPA2 uses the _____ _____ _____ to provide security.

A

CCM Mode Protocol (CCMP)

33
Q

digital certificates are a secure means to provide an unknown third party with a trusted copy of the public key belonging to an individual, organization, or device (T/F)?

A

True!

34
Q

Digital Certificates are issued by a trusted ______ ______.

A

Certificate Authority (CA)

35
Q

When a user or application wishes to verify the digital certificate, they do so by validating the digital signature using the CA’s ____ key.

A

public

36
Q

If the signature is authentic and the CA is trusted, the public key may then be trusted (T/F)?

A

True!

37
Q

Certificate authorities may revoke a digital certificate by placing it on the ______ ______ _____ .

A

Certificate Revocation List (CRL)

38
Q

Certificate Revocation List (CRL) is a slow approach, so it was replaced by what?

A

Online Certificate Status Protocol (OCSP)

39
Q

What does Online Certificate Status Protocol (OCSP) provide?

A

Real-time certificate verification.

40
Q

How many varieties do Digital Certificates issued by CAs come in?

A

Three varieties

41
Q

In this Certificate Type…

CA verifies that the certificate subject controls the domain name. It is the weakest form of validation.

A

Domain Validation (DV)

42
Q

In this Certificate Type…

CA verifies the name of the business purchasing the certificate in addition to domain ownership.

A

Organization Validation (OV)

43
Q

In this Certificate Type…

CA performs additional checks to verify the physical presence of the organization at a registered address.

A

Extended Validation (EV)

44
Q

Organizations not wishing to purchase a digital certificate from a CA may create their own _____-_____ certificates.

A

self-signed

45
Q

Self-signed certificates are fine for internal use but will not be trusted by external users (T/F)?

A

True!

46
Q

In cryptography, key strength is directly associated with which of the following (select two).

  • Key Length
  • Certificate Chaining
  • Cipher Technology
  • Key Exchange
A
  • Key Length

- Cipher Technology

47
Q

As a developer you need to protect code from tampering or reverse engineering. You choose to obfuscate the data using a Boolean operation. Which of the following methods will you choose?

A. Shift Cipher
B. XOR
C. Substitution Ciphers
D. ROT-13

A

B. XOR

XOR is a type of bitwise or Boolean operation used to manipulate values. Any two binary input values must differ for the result to be true and return to one. If they are the same, the result is false and returns to zero. A unique value can be paired with blocks of data to create a unique result based upon this XOR operation, obfuscating the data.

48
Q

What is ROT-13?

A

A simple letter substitution cipher that replaces (rotates) a letter with the 13th letter after it, in the English alphabet, obfuscating the data.

49
Q

What is a Shift Cipher?

A

aka Caesar Cipher, is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet, obfuscating the data.

50
Q

What is a Substitution Cipher?

A

Encrypts data using a fixed system of consistently replacing one value with standardised different value, obfuscating the data. The receiver can decrypt the data by performing the reverse substitution.

51
Q

Which of the following is a function of DHE (Ephemeral Diffie-Hellman)?

A. Provides authentication
B. Uses elliptic curves
C. Uses static keys
D. Provides perfect forward secrecy

A

D. Provides perfect forward secrecy

Which means that a key cannot be compromised in the future; since the keys are only used once, they can’t be compromised even if the private key is compromised in the future.

52
Q

DHE uses static keys (T/F)?

A

False!

New temporal keys are created for every exchange.

53
Q

Why does Elliptic Curve Diffie-Hellman Exchange (ECDHE) combine Diffie-Hellman with elliptic curves?

A

It allows for better security