Sec 701 - Encryption Flashcards

1
Q

RA

A

Registration Authority - Accepts registration requests & authenticates the entity that makes a request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PBKDF2

A

Password-Based Key Derivation Function 2 - Key stretching algorithm used for protecting passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

A

Hash Message Authentication Code - Combines cryptographic hash function with a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaC

A

Infrastructure as Code - Manages infrastructure resources through scripts & templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CRC

A

Cyclic Redundancy Checks - Hash function used for error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DSA

A

Digital Signature Algorithm - Creates & verifies digital signatures, not suited for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA

A

One of the oldest & widely used public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VLSM

A

Variable Length Subnet Mask - Networking technique that divides an IP range into subnets with different subnet masks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECDSA

A

Used for IoT, no native encryption and used for digital signatures. Derived from Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TACACS

A

Networking protocol Uses TCP for reliable communication & encrypts ENTIRE payload. Is AAA compliant.

Terminal Access Controller Access Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SAE

A

802.11 network standard compliant, used with WPA3 personal. Hash of a generated key unique to each authentication to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PKCS

A

Public-key Cryptography Standards - Standards for cryptography that provide guidelines and APIs for cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IaM

A

Identity Access Management - User access control to specific network segments & resources based on roles & permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Ciphers

A

AES, DES, IDEA, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric Ciphers

A

DHE, ECC, RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

KEK

A

Key-Encryption-Key - Used in key management systems to add an extra layer of security when encrypting and decrypting

17
Q

PFS

A

Perfect Forward Secrecy - Strengthen security of session keys & encrypt/decrypt automatically

18
Q

IKE

A

Internet Key Exchange - Set up secure connections & exchange cryptographic keys in IPsec VPNs

19
Q

PSK

A

Pre-Shared Key - A secret key that has been established between the parties who are authorized to use it by means of some secure method

20
Q

RC4

A

Legacy stream cipher used in WEP

21
Q

Stream Cipher

A

Each plaintext digit is encrypted one at a time

22
Q

DES

A

Data Encryption Standard - Legacy symmetric-key block cipher. Influential but no longer used.

23
Q

TGT

A

Ticket Granting Ticket (Kerberos) - Secure token granted to a user after initial login, do not need to re-enter credentials every time they use a service.

24
Q

GCM

A

Combines Cyber Threat Monitoring (CTM) for encryption with an authentication mechanism to ensure both data confidentiality and integrity

25
Q

IDEA

A

Form of symmetric key block cipher, REPLACED by AES

26
Q

AES

A

Advanced Encryption Standard - Symmetric block cipher chosen by the US Govt. Replaces DES & IDEA

27
Q

CFB

A

Cipher Feedback - Transforms a block cipher into a stream cipher, enables encryption of individual bits or bytes

28
Q

CBC

A

Cipher Block Chaining - Chains cipher blocks together, each cipher text block depends on the previous block.

29
Q

ECB

A

Simple mode of operation with a block cipher, used with symmetric key encryption