keys and kerberos Flashcards
how many keys does Kerberos use
3 keys
how many keys does private encryption use
1 key
how many keys does public encryption use
2 keys
what does SSL stand for
secure socket layer
what does CA stand for
certificate authentication authority
what does TLS stand for
transport layer certificates
what is encryption
scrambling the data
what is decryption
making the data readable
what is the other name for private key encryption
symmetric key encryption
what is the other name for public key encryption
asymmetric key encryption
what is the most used stream cypher
RC4
what is block cypher
encryption happens in chunks
what is stream cypher
encrypts a single bit at a time
what is a security token
it is a piece of hardware that the user carries to wirelessly authenticate
what is a graphical password
a series of images or a pattern used as a code to authenticate
what are the usual sizes in a block cypher
64,128 and 256 bits
what is network address translation
when private ip addresses are given to the devices within your network
what is IPV4
it is version four of the ip addresses it is made up of 32 bits and is the most used ip version
what is a disadvantage of private key encryption
you need to have a way of getting the key to the required person
when is a digital signature important
it is used to detect forgeries
what is accepted
allow the traffic through
what is rejected
do not allow the traffic through but send a response
what is dropped
do not allow the traffic through but do not send a response