Fundamentals of VPN Technology and Cryptography Flashcards
What algorithms in a VPN provide the confidentiality?
AES, 3DES
A remote user needs to access the corporate network from a hotel room, what type of VPN is used?
Remote-Access VPN
Which type of VPN technology is likely to be used in a site-to-site VPN?
IPSec
What are some benefits of VPN?
Confidentiality, Data Integrity
Name two symmetrical encryption ciphers?
AES, 3DES
What is the primary difference between a hash and Hashed Message Authentication Code (HMAC)?
Keys
What is used to encrypt the hash in a digital signature?
Sender’s private key
What are some valid options to protect data in motion with or without a full VPN?
TLS, SSL, HTTPS, IPSec
Why is the public key in a typical public-private key pair referred to as public?
Because it’s shared publicly
What is the key component used to create a digital signature?
Private key
What is the key component used to verify a digital signature?
Sender’s public key
What is another name for a hash that has been encrypted with a private key?
Digital signature
What are the primary responsibilities of a certificate authority?
Issuing identity certificates, Tracking identity certificates
Name some ways a client can check to see whether a certificate has been revoked?
CRL, OSCP, LDAP
Name four items found in a typical identity certificate?
CRL locations, Validity date, Public key of owner, serial number
Which standard format is used to request a digital certificate from a CA?
PKCS#10
When obtaining the initial root certificate, what method should be used for validation of the certificate?
Telephone
Which method, when supported by both the client and the CA, is the simplest to use when implementing identity certificates on the client?
SCEP