Fundamentals of VPN Technology and Cryptography Flashcards
What algorithms in a VPN provide the confidentiality?
AES, 3DES
A remote user needs to access the corporate network from a hotel room, what type of VPN is used?
Remote-Access VPN
Which type of VPN technology is likely to be used in a site-to-site VPN?
IPSec
What are some benefits of VPN?
Confidentiality, Data Integrity
Name two symmetrical encryption ciphers?
AES, 3DES
What is the primary difference between a hash and Hashed Message Authentication Code (HMAC)?
Keys
What is used to encrypt the hash in a digital signature?
Sender’s private key
What are some valid options to protect data in motion with or without a full VPN?
TLS, SSL, HTTPS, IPSec
Why is the public key in a typical public-private key pair referred to as public?
Because it’s shared publicly
What is the key component used to create a digital signature?
Private key
What is the key component used to verify a digital signature?
Sender’s public key
What is another name for a hash that has been encrypted with a private key?
Digital signature
What are the primary responsibilities of a certificate authority?
Issuing identity certificates, Tracking identity certificates
Name some ways a client can check to see whether a certificate has been revoked?
CRL, OSCP, LDAP
Name four items found in a typical identity certificate?
CRL locations, Validity date, Public key of owner, serial number