N2K - Flash Cards - General Security Concepts - Explain the importance of using appropriate cryptographic solutions
Which type of encryption can encrypt an entire drive or series of drives?
Volume-Level
Which key-pair key should be encrypted and protected with a password when stored?
A private key
Which type of key management does Secure Multipurpose Internet Mail Extensions (S/MIME) use: centralized or decentralized?
Centralized
What are trusted entities issuing digital certificates validating the identity of entities in secure communication?
Certificate Authorities
Which certificates are used to secure multiple websites with a single SSL certificate?
Wildcard Certificates
How many levels up do wildcard certificates support?
Only one level up in the fully qualified domain name (FQDN)
What is the difference between TPM and HSM chips?
Trusted Platform Module (TPM) chips are part of the motherboard. Hardware Security Module (HSM) chips are part of a PCI card that is mounted in a slot on the motherboard.
Which algorithms are asymmetric key algorithms?
Rivest, Shamir, and Adleman (RSA)
Elliptic Curve Cryptosystem (ECC)
Diffie-Hellman
El Gamal
Digital Signature Algorithm (DSA)
Knapsack
What is the default automated key-management protocol for IPSec?
Internet Key Exchange (IKE)
What is the technique of replacing sensitive data with unique identifiers to protect confidentiality during storage or transmission?
Tokenization
What is a TPM?
A dedicated processor that uses cryptographic keys to perform a variety of tasks
What can be described as a distributed database accessible to all participants, recording transactions transparently, like in blockchain technology?
Open Public Ledger
What is the term for unencrypted network traffic?
Cleartext Communication
What is the initial certificate in a hierarchy, ensuring authenticity and integrity of subsequent certificates in secure communications.
Root of Trust
What portion(s) of the IP packet are encrypted in IPSec transport mode?
The payload