Module 13 Using Decryption Flashcards

1
Q

What are digital certificates used for?

A

Digital certificates used to authenticate the communication between end nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSL and TLS help prevent what?

A

Data exfiltration and malware introduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens to inbound SSL traffic to the firewall?

A

Traffic is decrypted so it can be inspected by App-ID, Content-ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why decrypt traffic?

A

Most web traffic is encrypted - but, we want to enforce decryption leaving the firewall and entering the firewall. This protects sensitive data from leaving and malicious content entering the network.
- enabling decryption includes preparing the keys and certs for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL/TLS - how are digital certificates used. (6 steps)

A

Client requests SSL connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Step 2

A

SSL server sends server certificated (signed copy of public key). Cert contains its identity and public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Step 3

A

Client verifies the server certificate, uses PKI (Public Key Infrastructure) to validate the server cert and public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Step 4

A

As long as the server public key is good, client uses server public key to encrypt a symmetric session key. Then it is sent to the server. Client Sends encrypted copy of session key to server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Step 5

A

Server uses its own private key to decrypt the copy of the session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Step 6

A

Both sides use the session key to encrypt comm for privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the firewall decryption types

A

SSL Forward proxy (Outbound), SSL Inbound Inspection, SSH Decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Break——————————————————————————————-

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is asymmetric

A

Two - public and private key. They are created at the same time, two mathematically related keys. Then you decide which is public and which is private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is symmetric encryption

A

A single shared key, encrypt and decrypt with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public vs private key?

A

You give the public key to the world. Anyone can see this key, you give it away. Any website can encrypt data and send it your way. Your private key is the only one that can decrypt data.

17
Q

What is a public key certificate?

A

Binds a public key with a digital signature, includes other details about the key holder.

18
Q

What is a PKI digital certificate?

A

Method of packaging and distributing public keys in such a way that proves the identity of the owners.

19
Q
A
19
Q
A
20
Q
A
21
Q
A