N2K - Flash Cards - General Security Concepts - Explain the importance of using appropriate cryptographic solutions

1
Q

Which type of encryption can encrypt an entire drive or series of drives?

A

Volume-Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which key-pair key should be encrypted and protected with a password when stored?

A

A private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of key management does Secure Multipurpose Internet Mail Extensions (S/MIME) use: centralized or decentralized?

A

Centralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are trusted entities issuing digital certificates validating the identity of entities in secure communication?

A

Certificate Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which certificates are used to secure multiple websites with a single SSL certificate?

A

Wildcard Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many levels up do wildcard certificates support?

A

Only one level up in the fully qualified domain name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between TPM and HSM chips?

A

Trusted Platform Module (TPM) chips are part of the motherboard. Hardware Security Module (HSM) chips are part of a PCI card that is mounted in a slot on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which algorithms are asymmetric key algorithms?

A

Rivest, Shamir, and Adleman (RSA)
Elliptic Curve Cryptosystem (ECC)
Diffie-Hellman
El Gamal
Digital Signature Algorithm (DSA)
Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default automated key-management protocol for IPSec?

A

Internet Key Exchange (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the technique of replacing sensitive data with unique identifiers to protect confidentiality during storage or transmission?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a TPM?

A

A dedicated processor that uses cryptographic keys to perform a variety of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be described as a distributed database accessible to all participants, recording transactions transparently, like in blockchain technology?

A

Open Public Ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term for unencrypted network traffic?

A

Cleartext Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the initial certificate in a hierarchy, ensuring authenticity and integrity of subsequent certificates in secure communications.

A

Root of Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What portion(s) of the IP packet are encrypted in IPSec transport mode?

A

The payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two chips are used to implement hardware-based encryption?

A

Trusted Platform Module (TPM) and Hardware Security Module (HSM) chips

17
Q

What is often found in mobile devices that is an isolated hardware/software environment for processing sensitive data?

A

Secure Enclave

18
Q

What is key escrow?

A

When you maintain a secured copy of a user’s private to ensure that you can recover the lost key

19
Q

What is the key length used by a one-time pad?

A

The key length is the same length as the message that is to be encrypted. The message length determines the key length.

20
Q

How is a digital signature created from a message digest?

A

It is encrypted using the sender’s private key.

21
Q

What type of encryption works with individual data entries in a database?

A

Record-Level

22
Q

Which public-key algorithm was the first to allow two users to exchange a secret key over an insecure medium without any prior secret keys?

A

Diffie-Hellman

23
Q

If Alice wants to encrypt a message using asymmetric encryption that only Bob can read, which key must she use?

A

Bob’s Public Key

24
Q

What is a digital proof of identity issued by an entity other than the recipient, facilitating secure online transactions?

A

Third-Party Certificate

25
Q

Which component performs peer authentication and key exchange within the Internet Protocol Security (IPSec) protocol?

A

The Internet Key Exchange (IKE)

26
Q

Which type of encryption safeguards the structure of a database and its contents?

A

Database-Level

27
Q

Which hashing algorithm produces a message digest of 160 bits in length?

A

Secure Hash Algorithm (SHA-1)

28
Q

What is the process of concealing original data with fictitious, but realistic, values to preserve usability while protecting sensitive information?

A

Data Masking

29
Q

What is the term for the process of hiding data in an image?

A

Steganography

30
Q

Certificate enrollment procedures typically require a user to provide proof of identity and which other item to a certification authority (CA)?

A

Public Key

31
Q

What is contained within an X.509 CRL?

A

A list of serial numbers of unexpired or revoked digital certificates that should be considered invalid

32
Q

Which type of cryptography is more secure: symmetric or asymmetric?

A

Asymmetric

33
Q

Which private-key encryption algorithm does Pretty Good Privacy (PGP) use to encrypt data?

A

International Data Encryption Algorithm (IDEA)

34
Q

What are the three issues that symmetric data encryption fails to address?

A

Data Integrity
Repudiation
Scalable Key Distribution