Encryption Technologies Flashcards

Security+

1
Q

What is a Trusted Platform Module (TPM)?

A

A specification for cryptographic functions, providing hardware-based security on devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What functions does a TPM cryptographic processor perform?

A

It includes a random number generator and key generators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is persistent memory in a TPM?

A

Unique keys burned into the TPM during manufacturing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is versatile memory in a TPM used for?

A

Storing keys, hardware configuration information, and securely storing BitLocker keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a TPM protect against dictionary attacks?

A

It requires a password to access its features, preventing unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Hardware Security Module (HSM)?

A

A high-end cryptographic hardware used to securely store thousands of cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what environments are HSMs commonly used?

A

In large environments, such as clusters with redundant power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What additional features do HSMs provide?

A

Key backup and cryptographic accelerators to offload CPU overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a key management system?

A

A centralized manager for services that manages keys for various encryption tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of environments do key management systems operate in?

A

They operate in both on-premises and cloud-based environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do key management systems improve security?

A

By separating encryption keys from the data and logging key use and important events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Alice’s private key refer to?

A

The symmetric key that Alice uses for secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Alice create a symmetric key?

A

Alice combines Bob’s public key with her own to generate the symmetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can key management systems do for users?

A

Create keys for specific services, associate keys with users, and rotate keys regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the significance of data location privacy?

A

Our most private data is often physically closest to us, such as on mobile phones or laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do attackers compromise data?

A

By continuously finding new techniques to exploit vulnerabilities.

17
Q

What is a secure enclave?

A

A protected area for secrets, often implemented as a hardware processor isolated from the main processor.

18
Q

What security features does a secure enclave provide?

A

True random number generator, real-time memory encryption, and root cryptographic keys.

19
Q

How does a secure enclave enhance system security?

A

By monitoring the boot process and performing AES encryption in hardware.