keys and kerberos Flashcards

1
Q

how many keys does Kerberos use

A

3 keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how many keys does private encryption use

A

1 key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how many keys does public encryption use

A

2 keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does SSL stand for

A

secure socket layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does CA stand for

A

certificate authentication authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does TLS stand for

A

transport layer certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is encryption

A

scrambling the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is decryption

A

making the data readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the other name for private key encryption

A

symmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the other name for public key encryption

A

asymmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the most used stream cypher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is block cypher

A

encryption happens in chunks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is stream cypher

A

encrypts a single bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a security token

A

it is a piece of hardware that the user carries to wirelessly authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a graphical password

A

a series of images or a pattern used as a code to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the usual sizes in a block cypher

A

64,128 and 256 bits

17
Q

what is network address translation

A

when private ip addresses are given to the devices within your network

18
Q

what is IPV4

A

it is version four of the ip addresses it is made up of 32 bits and is the most used ip version

19
Q

what is a disadvantage of private key encryption

A

you need to have a way of getting the key to the required person

20
Q

when is a digital signature important

A

it is used to detect forgeries

21
Q

what is accepted

A

allow the traffic through

22
Q

what is rejected

A

do not allow the traffic through but send a response

23
Q

what is dropped

A

do not allow the traffic through but do not send a response