Module 7 Flashcards
Which is an IPsec protocol that authenticates that packets received were sent from the source?
- AH
- PXP
- DER
- CER
Authentication Header (AH) protocol.
What is the name of the device protected by a digital certificate?
-RCR
- V2X2
- CN
- TLXS
The common name (CN)
What is the strongest technology that would assure Alice that Bob is the sender of a message?
- Digital signature
- Encrypted signature
- Digital certificate
- Digest
Digital certificate
Which is the first step in a key exchange?
- The web browser sends a message (“ClientHello”) to the server.
- The web browser verifies the server certificate.
- The browser generates a random value (“pre-master secret”).
- The web server sends a message (“ServerHello”) to the client.
The web browser sends a message (“ClientHello”) to the server.
Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need?
- Root
- Domain validation
- Extended validation
- Website validation
Domain validation
Which of the following is the earliest and most general cryptographic protocol?
- SSL
- HTTPS
- SSH
- TLS
secure sockets layer (SSL)
John and Sarah are working for Star Alliance. John had to send certain confidential data and messages to Sarah online. The use of which of the following will ensure that the message’s sender is, in fact, John?
-Public key
- Physical signature
- Digital signature
- Digital certificate
Digital certificate
Which of the following digital certificates are self-signed and do not depend on the higher-level certificate authority (CA) for authentication?
-Root digital certificates
- Intermediate digital certificates
- User digital certificates
- Domain digital certificates
Root digital certificates
Which of the following protocols are used to secure HTTP?
- TLS and SRTP
- SSH and SSL
- TLS and SSH
- TLS and SSL
Transport layer security (TLS) and the older secure sockets layer (SSL)
Which of the following is a process where a private key is split into two halves, encrypted, and stored separately for future use?
- Revocation
- Escrow
- Renewal
- Destruction
Escrow is a process in which keys are managed by a trusted third party.
You have been asked to implement a block cipher mode of operation that requires both the sender and receiver of the message to have access to a synchronous counter that adds an AAD to the transmission. Which operating block cipher mode should you use?
- ECB
- CBC
- CTR
- GCM
GCM
Which of the following provides confidentiality services?
- Authentication mode
- Transport mode
- Stream cipher mode
- Unauthentication mode
Unauthentication mode
Which of the following is defined as a structure for governing all the elements involved in digital certificate management?
- Web of trust model
- PKI
- M-of-N control
- CA
Public key infrastructure (PKI) is an underlying infrastructure for key management of public keys and digital certificates governing all the elements involved in the digital certificate management-including hardware, software, people, policies, and procedures-to create, store, distribute, and revoke digital certificates. PKI is digital certificate management.
Malik and Chris are shopping for shoes on an e-commerce website and need to enter their credit card details. Which of the following can assure them that they are using the retailer’s authentic website and not an imposter’s look-alike site that will steal their credit card details?
- Digital signature
- Hash digest
- SSL
- Digital certificate
Digital certificate
Which of the following is a combination of encryption, authentication, and MAC algorithms, like a collection of instructions on securing a network?
- TLS
- Cipher suite
- Stream cipher
- SSH
Cipher suite is a named combination of the encryption, authentication, and message authentication code (MAC) algorithms.
How is confidentiality achieved through IPsec?
- ESP
- AHA
- ISAKMP
- AuthX
Encapsulating Security Payload (ESP) is an IPsec protocol that encrypts packets.
Who verifies the authenticity of a CSR?
- Signature authority
- Registration authority
- Certificate authority
- Certificate signatory
A user electronically signs the CSR by affixing her public key and then sends it to a REGISTRATION AUTHORITY that is responsible for verifying the credentials of the applicant.
Which of the following can a digital certificate NOT be used for?
- To encrypt messages for secure email communications
- To encrypt channels to provide secure communication between clients and servers
- To verify the authenticity of the CA
- To verify the identity of clients and servers on the Web
To verify the authenticity of the CA
What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?
- Certificate attributes
- Electronic Code Book (ECB) repositories
- CTR
- PFX
Certificate attributes
Which of the following is defined as a structure for governing all the elements involved in digital certificate management?
- Web of trust model
- CA
- PKI
- M-of-N control
PKI
Amtel University decides to keep a record of their student data in a backup server. The administrator contacts you to identify the right command interface protocol to be used in this. Which command interface protocol should you advise?
- TLS
- HTTPS
- SSL
- SSH
Secure shell (SSH) is an encrypted alternative to the Telnet protocol used to access remote computers
Samira is developing a virtual private chat application for ABC Consulting. The following are requirements provided by the organization while making the application:
- All the communications should happen within the same network, host-to-host.
- The information shared through this app should be kept confidential. Hence, the whole IP packet should be encrypted, giving access to only authorized personnel.
- There should be a private network for host-to-host communication
Which of the following modes should Sara consider for encryption in this project?
- Tunnel mode
- Counter mode
- GCM mode
- Transport mode
Tunnel mode encrypts the whole IP packet, including the header and the data portion.
It also enables host-to-host communication. Hence, this is the best encryption mode to use.
During an investigation, it was found that an attacker did the following:
Intercepted the request from the user to the server and established an HTTPS connection between the attacker’s computer and the server while having an unsecured HTTP connection with the user. This gave the attacker complete control over the secure webpage.
Which protocol helped facilitate this attack?
- S/MIME
- SSL
- SSH
- ECB
SSL
Which of the following terms best describes the process in which a user believes that the browser connection they are using is secure and the data sent is encrypted when in reality, the connection is insecure, and the data is sent in plaintext?
- SSL stripping
- SQL injection
- API attack
- Revocation
SSL stripping