Exam1 Flashcards

1
Q

What is key space?

A

The set of all possible keys that can be used in cryptographic algorithm. The size of key size determines the strength of the encryption making it harder for attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital certificates use asymmetric keys for validation. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is FRR?

A

False Rejection Rate: The percentage of valid users incorrectly rejected by a biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is FAR?

A

False Acceptance Rate: The percentage of invalid users incorrectly accepted by a biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CER?

A

Crossover Error Rate: The point where FRR and FAR are equal, indicating the balance between security and convenience in a biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can private key be used to both encrypt and decrypt information?

A

Yes
For decryption: In asymmetric encryption, the private key is used to decrypt data that was encrypted with the corresponding public key.
For encryption: In digital signatures, the private key is used to “encrypt” a message or hash (sign) to prove the identity of the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is faster, asymmetric key or symmetric key?

A

Symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In PKI, what keys do we need?

A

Public key: Shared openly, used to encrypt data or verify digital signatures.
Private key: Kept secret, used to decrypt data or create digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data integrity is insured by what?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is authentication based on?

A

Authentication is based on verifying the identity of a user, device, or entity. There are three main factors: Something you are, Something you have, Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the concept of crypto analysis?

A

The study and practice of analyzing and breaking cryptographic systems. This involves finding a weakness in the encryption algorithm without having to know the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Bell LaPadula model enforce?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two rules of the Bell LaPadula model?

A

No read up, No write down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does worm software do?

A

malicious software that self-replicates and spreads independently through networks. it typically happens through network weaknesses, email attachments, and removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three factors of authentication?

A

Something you have (passcode), something you are (typing a passcode), something you do (face-id to scan facial features)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A fingerprint is an example of something you are?

A

Yes, a fingerprint is an example of something you are in biometric security. It falls under the category of biometric identifiers, which are unique physical traits used to verify a person’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why do we use PKI certificate?

A

We want secure, detectable, reliable communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an access token?

A

A physical token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is social engineering?

A

Manipulating people to gain confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the CA do?

A

The Certificate Authority (CA) signs digital certificates with its private key. This ensures the authenticity and integrity of the certificate, allowing others to verify it using the CA’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Do digital signatures always use asymmetric keys? True or False?

22
Q

What are the levels in security policies?

A

Policies, Procedures, Guidelines

23
Q

If root CA’s private key is compromised, what is the consequence?

A

Something bad happens

24
Q

Is hashing reversible?

A

No, it cannot go back to the original plain text document from a hash

25
What does the acronym PKI stand for?
Public key infrastructure
26
In a Local Area Network (LAN), when a device sends a packet to another device within the same network, how does the router determine where to deliver the packet?
MAC addresses
27
what's the component of digital certificate?
Subject: Entity it’s issued to (like a user or device) Issuer: Certification Authority (CA) Serial Number: Unique identifier Validity Period: Start and end date Public Key: For encryption and signature verification Signature Algorithm: Algorithm used by CA to sign the certificate Digital Signature: CA's signature for authenticity
28
What is the difference between class A, B, and C networks? Which class can have the most number of users?
The difference between Class A, B, and C networks lies in their IP address ranges and the number of devices they can support: Class A has a bigger range and support a larger number of devices than B and C. A > B > C
29
Which protocol is faster: TCP or UDP?
UDP is faster
30
digital signature is just a document that has association with the public key and identity (user’s name) t/f
False
31
So when the device is connected to our router, what is the process called when the router manually processes the IP address?
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network, allowing them to communicate without manual configuration.
32
What are the three properties of security?
CIA (confidentiality, integrity, availability)
33
What is two-factor authentication?
A security process that requires two different forms of identification
34
What is plain text encrypted into?
Ciphertext
35
What does AAA stand for?
Authorization, Authentication, Accounting
36
In a company that enforces login time restrictions for employees, which access control model is being used to automatically enforce these time-based policies, preventing unauthorized access outside of designated hours?
The company is using Mandatory Access Control (MAC), where access policies (such as login time restrictions) are enforced by the system based on predefined rules, not by the user's discretion.
37
Difference between hub, switch, router, bridge
Hub: A basic networking device that connects multiple computers in a network. Switch: Connects multiple devices within a LAN (Local Area Network) and directs data to the specific device. Router: Connects different networks together and routes data between them. Bridge: Connects two or more network segments to make them work as a single network.
38
what’s shoulder surfing?
Shoulder surfing is the act of spying on someone’s private information by observing their screen, keyboard, or device in a public or semi-public place. This can involve looking over someone's shoulder to steal sensitive data, like passwords or personal information, without their knowledge.
39
What is used to deliver packets from and through the internet?
Routers are used to deliver packets from and through the internet. They determine the best path for data to travel and direct packets to their destination.
40
What is the main difference between TCP and UDP?
TCP is connection-oriented, meaning it ensures reliable data delivery, error checking, and flow control. (three-way handshake) UDP is connectionless, meaning it sends data without ensuring reliability, speed being its main advantage.
41
what’s the difference between HMAC and digital signature?
HMAC (symmetric) and DS (asymmetric)
42
What is the difference between LAN and WAN?
LAN covers a small geographical area, like a home, office, or building, and is typically faster and more secure. WAN covers a large geographical area, such as cities, countries, or even continents, and connects multiple LANs.
43
In PKI, who validates identity and binds it to the public key certificate?
Certificate Authority (CA)
44
What is the role of RA in PKI?
In Public Key Infrastructure (PKI), the Registration Authority (RA) verifies the identity of users and devices before they can receive a digital certificate from the Certificate Authority (CA).
45
What is the primary use of hashing?
The primary use of hashing is to quickly compare and verify data, such as checking passwords or storing data in hash tables for fast retrieval.
46
Is hashing a two-way function?
No, it is a one-way function and irreversible
47
Network: Lightweight and fast packet
ICMP is used by attackers because it is lightweight
48
Bus Topology
a central line that all devices connected to, so every device is getting network from one cable and if that cable gets destroyed then all the devices will have no internet connection
49
Star Topology
a network design where all devices are connected to a central hub or switch ex: internet box at home or office
50
Single Sign-On (SSO)
another type of authentication that verifies the user through a single login and can be used through multiple applications without having to log in those extra applications ex: canvas
51
Non-Repudiation
ensures that the sender cannot deny signing or sending off a message between the parties