don't use Flashcards

1
Q

Digital signature require what?

A

Public Key infrastructures (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

X.509 V.4 is for what?

A

Certificate Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

A

Hashed Message Authentication Code (no PKI Used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates are Digitally signed by who?

A

(CA) Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The steps in a SSL / TLS connection?

A
  1. The client makes a SSL Session
  2. The Server provides its Certificate with its public key
  3. the client encrypts with the servers public key
  4. the server decrypts wit it’s private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main Hashing Algorithms and bit size

A
  1. MD-5 128 bits
  2. SHA-1 160 Bits
  3. SHA-256 256 Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OCSP ?

A

Online Certificate Status Protocol

( Certificate Revocation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to tell if a Certificate has been Revoke

A
  1. Online Certificate Status Protocol (OCSP)

2. CRL (downloadable list from CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two Documents produce the same Hashed # ?

A

A collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An Attempt to Cause Collisions

A

Birthday Attacks (Hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificates help to prevent what ?

A

Man in the middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric Stream Crypto

A

RC-4 Used on WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 parts of the Public Key infrastructures (PKI)

A
  1. (CA) Certificate Authority
  2. (RA) Registration Authority
  3. Certificate Repository
  4. Certificate Revocation list
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Very Efficient Crypto?

A

ECC Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what Cryptography is used on Low CPU powered devices?

A

ECC Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Key-Agreement Without Pre-shared Secrets

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

First Asymmetric Algorithm

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Use Factorization

A

RSA use a Trap-Door function for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Digital signature use what Algorithm

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 6 Asymmetric Algorithm

A
  1. RSA
  2. DSA
  3. ECC = Elliptical Curve Cryptography
  4. El Gamall
  5. DH = Diffie Hellman
  6. Knapsack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bulk Encryption use What Cryptography Type?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cryptography used for Key Encryption and distribution

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric Algorithm Key Formula

A

2N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Symmetric Algorithm Key Formula

A

N=(N-1) /2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SSL / TLS use what for Key Exchange

A

Asymmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SSL / TLS use what for Data Exchange

A

Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In Asymmetric How do we get Authenticity?

A

Senders Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In Asymmetric How do we get Non-Repudiation?

A

Hash Encrypted by Senders Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In Asymmetric How do we get Privacy?

A

Receivers’s Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a Digital signature made with?

A

A hash with the Sender’s Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A Private Key Crypto?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IDEA

A

Used by PGP
An Symmetric Algorithm &
Block Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

3DES
Algorithm type?
Block or stream?
# of rounds?

A

Symmetric Algorithm
Block Algorithm
48 Rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

3DES was replaced by?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

BlowFish
Algorithm type?
Block or stream and size?
# of rounds?

A

Symmetric Algorithm
Block Algorithm
64-bit block size
48 Rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

BlowFish
Algorithm type?
Block or stream and size?
# of rounds?

A

Symmetric Algorithm
Stream Algorithm
no rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Symmetric Algorithm only gives you what?

A

Privately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Stream Ciphers use What?

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

XOR

A

if values are:
A like = 0 value
Different = 1 value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Block Crypto have to be what type of Algorithm ?

A

Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Symmetric Block Algorithms are?

A
  1. AES - Standard
  2. 3DES - More cpu intenced (slower)
  3. P2P - IDEA used in mail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

the slower Algorithm is?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Other names for Symmetric Algorithm?

A
  1. Private Key
  2. Secret Keys
  3. Share Keys
  4. Session Keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Shared Key Crypto?

A

Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Kerchoff’s Principle Means?

A

Keep the Key Secret, The algorithm is Publicly known. ** Openness **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is Diffusion in Block cipher ?

A

Transposition

*** Plain Text is Added with the Cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is Confusion in Block cipher ?

A

Relates to Subtitution

** Good Strong Math)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Diffusion and Confusion is used in what?

A

Symmetric Algorithm Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Two Primary Attributes To Symmetric Algorithm Block cipher?

A

Diffusion and Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Another way to say Cipher?

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The 5 Desirable qualities of an Algorithm

A
  1. Diffusion
  2. Confusion
  3. Avalanche = A charter change Cascades through the text
  4. Permutations = Rounds
  5. openess = Kerchoff’s Principle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Algorithm rounds are also called ?

A

Permutations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Sue-do Randam Numbers is also called?

A

Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Security Services provided by Cryptography?

A
P = Privacy
A= Authenticity
I = Integrity
N= Non-Repubiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Authenticity does what?

A

Verifies the Claimed Identity

56
Q

The 4 Requirements for Vernam Cipher (one Time Pad)

A
  1. The Key must be used only once.
  2. The Pad Must be al least as long as the Message
  3. Key Pad is Statistically Unpredictable
  4. The key Pad must be delivered and stored securely.
57
Q

The only unbreakable Mathematically cryptography is?

A

Vernam Cipher (One Time Pad)

58
Q

The Cipher that the first letter of the key is matched up against the first letter of the message?

A

Polyalphabetic Cipher

VIGNERE

59
Q

First Polyalphabetic Cipher ?

A

VIGNERE

60
Q

A cipher that was wrapped rounded a rod?

A
Scytale
The size (diameter) of the rod was the secret key
61
Q

A cipher that are subject to pattern analysis

A

Substitution Ciphers

Caesar Cipher

62
Q

Caesar Cipher was what type of Cipher?

A
Substitution Cipher
shift characters (3) spaces
63
Q

The Security Model That Protects Integrity?

A

BIBA Model and Clark-Wilson

64
Q

The Security Model That enforces well-formed transactions?

A

Clark-Wilson

65
Q

Clark-Wilson uses what for Separation of duties?

A

API’s

66
Q

The Main stream Security Mode is ?

A

Clark-Wilson

NON-DOD

67
Q

the Down Data’s Dirty is what Security Mode?

A

BIBA Model

68
Q
  • Integrity Axiom means what?
A

NO Write UP

BIBA Model

69
Q

The Processor Functions in What Ring?

A

Ring 3

70
Q

What Ring is the User Mode in?

A

Ring 3

71
Q

What Ring is the Privileged Mode in?

A

Ring 0

72
Q

The 5 types of CPU executions?

A
  1. Multi programming (windows 3.1)
  2. Multitasking
  3. Multitheading
  4. Multiprocessing
  5. Multi-core processors
73
Q

The Two types of Multitasking?

A

Cooperative

Preemptive

74
Q

Cooperative Multitasking does not do what?

A

no isolation of the individual processes

75
Q

Very high speed memory used for storage by the CPU is called?

A

Registers

76
Q

Execution or CPU Cycle is when?

A

The Control Unit and ALU performs the mathematical or logical operations on the DATA

77
Q

Used by the Processor to keep track of which instruction code have been processed and what ones will be processed next

A

Instruction Pointer

78
Q

CPU Fetch?

A

When the Control unit gets the instructions from the System Memory.

79
Q

The 4 CPU cycles?

A
  1. Fetch
  2. Decode
  3. Execute
  4. Store
80
Q

TCB ?

A

Trusted Computer Base

It secures the cpu, memory, OS Kernel and Firmware.

81
Q

It Delineates the trusted and untrusted components within a computer system

A

Security Perimeter

*** It Isolates the TCB

82
Q

Isolates the Trusted Computer Base (TCB)?

A

Security Perimeter

83
Q

Security Kernel

A

The Enforcer

Enforces the Reference Monitor Concept

84
Q

performs the mathematical or logical operations on the DATA it gets from memory

A

ALU

85
Q

What are the 3 Elements of the Trusted Computer Base (TCB)

A
  1. Security Perimeter
  2. Reference Monitor
  3. Security Kernel
86
Q

Is an Abstract Machine concept that mediate ALL access between SUBJECTS and OBJECTS

A

Reference Monitor

THE Rules

87
Q

Windows 10 Falls under what TCSEC Level

A

C

88
Q

the operation Mode that use a Reference Monitor to control Access?

A

Multilevel

89
Q

Operation Mode that enforces an AIRGAP

A

Dedicated

90
Q

Which Security Feature prevents an Covert Channel?

A

NON Interference

91
Q

Called the Orange Book

A

TCSEC

Trusted Computer System Evaluation Criteria

92
Q

TCSEC

A

Trusted Computer System Evaluation Criteria

93
Q

NO Read Down and No Write UP, is what Security Model?

A

BIBA Model

94
Q

What Model uses ALPHA, BETA GAMMA

A

The Lattice-Based Access Controls

95
Q

What security model does not prevent unauthorized alterations of High-Level Data?

A

Bell-Lapadula Model

96
Q

NO READ UP and NO Write DOWN is what Security Model?

A

Bell-Lapadula Model

97
Q

what Security Model protects Confidentialy?

A

Bell-Lapadula Model

98
Q

Simple Security Property is ?

A

NO READ UP

99
Q
  • Security Property is ?
A

NO WRITE Down

100
Q

Strong * Property is

A

NO READ / Write UP or Down

101
Q

A Security Model will dictate what?

A

How a system will enforce security

102
Q

The main security models are?

A
  1. Bell-Lapadula
  2. BIBA
  3. Clack-Wilson
103
Q

Static Ram is used For?

A

CACHE

104
Q

It uses a specific voltage to indicate a Bit Value of 1

A

Flash memory

105
Q

Ram that looks ahead, and fetches the next block at the same time?

A

(EDO DRAM)

Extended Data Out DRAM

106
Q

RAM the Synchronizes it self with the cpu clock for faster communucations?

A

Synchronous DRAM (SDRAM)

107
Q

Makes up the Majority of computer RAM

A

DRAM

108
Q

RAM that does not need to be continuously refreshed?

A

STATIC RAM (SRAM)

109
Q

SRAM

A

STATIC RAM

110
Q

RAM that need to be continuously refreshed?

A

DRAM = Dynamic RAM

111
Q

DRAM

A

Dynamic RAM

112
Q

Memory speed is represented in?

A

NS = Nanoseconds

Lower the NS the faster the Memory is.

113
Q

The Two modes that Multi-processing units can operate in?

A

Symmetric

Asymmetric

114
Q

The Symmetric Multi-processing mode

A

All processors are load balanced

(most common)

115
Q

The Asymmetric Multi-processing mode

A

The processors can be completely dedicated to a task or application.

116
Q

The Multi-processing mode used if Time-sensitivity is a must.

A

Asymmetric

117
Q

The CPU Mode that allows anything to happen?

A

Kernel / privilege mode

118
Q

privilege mode is also called?

A

Kernel mode or supervisor mode

119
Q

user mode is also called?

A

problem state

120
Q

The two CPU Mode?

A

privilege mode

User Mode

121
Q

What is a list of pointers to process called?

A

Stack

122
Q

Where is the Stack Pointer and program counter Helded at?

A

Special Registers

123
Q

What Register points to the next instructions to be Executed?

A

Program Counter register

124
Q

What are the 3 types of Registers?

A
  1. General Registers
  2. Program Counter Registers
  3. Special Registers
125
Q

Inside of a Computer is called?

A

ALU

126
Q

ALU

A

Algorithmic Logic Unit (ALU)

127
Q

What are the different View of an overall System?

A
  1. Functionality
  2. performance
  3. Interoperability
  4. Security
128
Q

A collection of Document types to Document an Architecture in a formal manner?

A

(AD) Architecture Description

129
Q

What Register holds variables and temporary results that the ALU will use as it executes instructions?

A

General Registers

130
Q

PSW?

A

Program stats word

131
Q

What is held in the special Registers?

A

(PSW) Program stats word

132
Q

What component retains stored Data longer when cooled?

A

RAM

133
Q

EEPROM

A

Electrically Erasable Programmable read only Memory

134
Q

EPROM

A

Erasable Programmable read only Memory

135
Q

what type of memory Uses a light to flash

A

(EPROM) Erasable Programmable read only Memory

136
Q

PROM

A

Programmable read only Memory

137
Q

what type of memory and only be written once?

A

(PROM) Programmable read only Memory