ISC2 - Study Notes 26 Flashcards
PGP, GPG, and OpenPGP support a web of trust. Current implementations of PGP can also use a public key infrastructure to retrieve and validate certificates.
Info
allows organizations with a private PKI and private CA to trust entities in another private PKI.
Cross-certification
refers to creating strong keys. Strong keys are random and of sufficient length that they cannot be guessed.
Key composition
refers to periodically replacing an old key with a new key.
Key Rotation
attack is possible when the attacker has samples of both plaintext and ciphertext data.
A known-plaintext (or known-text)
doesn’t have access to all of the plaintext but either has access to some plaintext or is able to predict plaintext that is included in the ciphertext.
Chosen-Plaintext
is an attack where the attacker has only ciphertext for analysis without any useful information about the plaintext data.
Ciphertext-Only Attack
A (host) record Resolves a host name to an ???
IPv4 Address
AAAA (host) record Resolves a host name to an ???
IPv6 Address
PTR (pointer) record Resolves an IP address to a ???
host name