cryptology Flashcards

1
Q

a _______ is electronic document used to bind a public key with an identity

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a ______ is a hierarchy of computers that issue and manages certificates

A

public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a _____ policy requires a administrator to manually approve or deny all request

A

manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a _______ policy allows CA’s to review information within the request to determine if it is valid information

A

automatic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the _______ is a list of certificates revoked by the CA

A

certificate revocation list (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ______ is used to checks the status of an individual digital certificate to verify if it is good or has been revoked

A

Online certificate status protocol (OCSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

they are responsible for issuing tickets, holding certificate practice statements (CPS) and publishing the certificate revocation list (CRL)

A

subordinate CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it is a declaration of the security that the organization is implementing for all certificates issued by the CA

A

certificate practice statement (CPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

they can be used in large, enterprise environments to offload client enrollment request by handling the verification prior to certificates being issued

A

registration authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a ______ issues certificates.

A

certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To request a certificate, a client must first

A

generate a public and private key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a public and private key pair is generated by an application called a

A

cryptographic service provider (CSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when requesting a certificate from a CA, the client sends identifying information along with a copy of the public key this is called

A

certificate signing request (CSR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the certificate revocation list (CRL) is published at the

A

CRL Distribution Point (CDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ is the official standard of ITU Telecommunication Standardization Sector (ITU-T) that identifies the format for public key certificates and certification path validation.

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ is a user who is authorized to request certificates for other users

A

Enrollment agent

17
Q

Users can obtain a copy of the CA’s certificate from the

A

Authority Information Access (AIA)

18
Q

_____ is a readable message.

A

plain test

19
Q

______ is a unreadable message to all but those for whom the message was intended.

A

cipher text

20
Q

______ is the method of recovering original data that has been encrypted without having access to the key used in the encryption process.

A

cryptoanalysis

21
Q

_______ is the associated items of cryptography that are used as a unit to provide a single means of encryption and decryption.

A

cryptosystem

22
Q

_________ is the study of cryptography and cryptanalysis.

A

cryptology

23
Q

it literally meaning “concealed writing”,

A

stenography

24
Q

____ is the process of using an algorithm to transform data from plain text to a cipher text in order to protect the confidentiality, integrity, and sometimes the authenticity of the message.

A

encryption

25
Q

______ is the procedure used to convert data from cipher text into plain text.

A

decryption

26
Q

________ cryptography uses a series of photons to encrypt and send messages

A

quantum

27
Q

_______ is a seed value used in encryption.

A

initialization vector (IV)

28
Q

a ______ cipher changes the position of characters in the plain text message.

A

transposition also called

anagram

29
Q

a _______ cipher replaces one set of characters with symbols or another character set.

A

substitution

30
Q

a ______ is a function that takes a variable-length string (message) and compresses and transforms it into a fixed-length value

A

hash

31
Q

• The hash value (output) is also referred to as a

A

message digest or digital fingerprint.

32
Q

_____ is the process of ensuring the security and availability of digital certificates.

A

Certificate management

33
Q

_________ model is used when one organization with a CA structure needs to trust certificates from another organization that has its own CA structure

A

a cross-certification or bridge

34
Q

a _______ configuration allows clients in one organization to trust any certificate issued by the other organization’s CAs and vice versa.

A

root-to-root

35
Q

a _____ configuration provides trust paths that can be configured for more restrictive certificate validation.

A

mesh