Pretest finals Flashcards

1
Q

What is the difference between symmetric and asymmetric cryptography?

A

Symmetric Cryptography: Uses the same key for both encryption and decryption (e.g., AES).
Asymmetric Cryptography: Uses a pair of keys — a public key to encrypt and a private key to decrypt (e.g., RSA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is RSA encryption, and how does it work?

A

RSA: A type of asymmetric encryption that uses two keys, a public key for encryption and a private key for decryption. It relies on the mathematical difficulty of factoring large prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is elliptic curve cryptography (ECC), and why is it considered more efficient than RSA?

A

ECC: Uses the mathematics of elliptic curves to create keys. It provides the same security as RSA with shorter key lengths, making it faster and more efficient, especially on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hash function, and how is it used in cryptography?

A

Hash Function: Converts input data into a fixed-size hash value. It is used for data integrity, digital signatures, and password storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain what a digital signature is and how it works.

A

Digital Signature: A cryptographic mechanism to verify the authenticity of a message. The sender signs the message with their private key, and the recipient can verify it using the sender’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of public key infrastructure (PKI) in web security?

A

PKI: A framework for managing digital keys and certificates, enabling secure communications and authentication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SSL/TLS, and how does it secure web communications?

A

SSL/TLS: Protocols that encrypt web traffic to ensure privacy, integrity, and authentication between web servers and browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of a Certificate Authority (CA) in SSL/TLS?

A

CA: A trusted entity that issues digital certificates, verifying the identity of websites and enabling secure connections through SSL/TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Public Key Infrastructure (PKI), and what are its key components?

A

PKI: A system for managing public-key encryption. Key components: Certificates, Certificate Authorities (CAs), Public and Private Keys, and Registration Authorities (RAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cryptographic nonce, and why is it used?

A

Nonce: A number used once in cryptographic protocols to prevent replay attacks and ensure freshness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a hash and a checksum?

A

Hash: A cryptographic function that produces a fixed-length string from input data, designed to be unique. Used for security and integrity.
Checksum: A simpler, non-cryptographic function for detecting errors in data. It’s not designed to be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Perfect Forward Secrecy (PFS) in TLS, and why is it important?

A

PFS: Ensures that session keys are not compromised even if the server’s private key is compromised later. It’s important for long-term security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a zero-knowledge proof, and how is it used in cryptography?

A

Zero-Knowledge Proof: A cryptographic method where one party proves to another that they know a value (like a password) without revealing the value itself. Used in privacy-preserving systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a Certificate Authority (CA) work within a PKI system?

A

CA Role: Issues and manages digital certificates to verify the identity of entities and ensure secure communication over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a digital certificate, and what information does it typically contain?

A

Digital Certificate: Verifies the identity of an entity (e.g., website). It contains the entity’s public key, the CA’s signature, and other identity-related information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an SSL/TLS handshake, and what steps does it involve?

A

SSL/TLS Handshake: The process of establishing a secure connection:
1. Client hello: Client sends supported protocols and a random number.
2. Server hello: Server responds with chosen protocol, certificate, and another random number.
3. Key exchange: Securely exchanges encryption keys.
4. Finished: Both sides confirm security settings and start encrypted communication.

17
Q

What is a Replay Attack, and how can it be prevented?

A

Replay Attack: An attack where valid data is re-transmitted maliciously. It can be prevented using nonces, timestamps, and session tokens.

18
Q

What are the differences between AES and DES encryption algorithms?

A

AES: Advanced Encryption Standard, more secure with key sizes of 128, 192, and 256 bits.
DES: Data Encryption Standard, older and less secure, using 56-bit keys. Now considered weak due to advances in computational power.

19
Q

What is an SSL Stripping Attack, and how can it be mitigated?

A

SSL Stripping Attack: Downgrades HTTPS connections to HTTP to intercept data. Mitigation involves using HTTP Strict Transport Security (HSTS) and redirecting all HTTP traffic to HTTPS.

20
Q

What is the concept of “least privilege” in web security?

A

Least Privilege: The principle that users and systems should only have the minimum access necessary to perform their functions. It helps reduce the impact of potential breaches.