Section 3: Security Architecture Flashcards

1
Q

Describes the structure, components, connections, and layout of security controls within an organization’s IT infrastructure

A

Security architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of layering defenses to provide added protection

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A well-defined boundary between the organization and the outside world

A

Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security model that emphasizes placing controls at the network and system levels to protect the information stored within

A

Network- or system-centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security model that emphasizes the protection of data regardless of its location

A

Data-centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Perimeter that ensures secure access to the Internet for enterprise employees and guest users residing at all locations, including those included in telecommuting or remote work

A

Internet perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: VPN traffic is first filtered at the ingress point to the specific IP addresses and protocols that are part of the VPN service.

A

False: VPN traffic is first filtered at the egress point to the specific IP addresses and protocols that are part of the VPN service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: Modern IT architectures are usually decentralized and deperimeterized.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: In distributed and decentralized architectures, the inherent risk is likely to increase, often as a function of moving critical applications, platforms, and infrastructure elements into the cloud.

A

False: In distributed and decentralized architectures, the THIRD-PARTY RISK is likely to increase, often as a function of moving critical applications, platforms, and infrastructure elements into the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security architecture approach that develops a matrix showing columns that represent aspects of the enterprise that can be described or modeled and rows representing various viewpoints from which those aspects can be considered

A

Sherwood Applied Business Security Architecture (SABSA) Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security architecture approach that addresses security as an essential component of the overall enterprise design

A

The Open Group Architecture Framework (TOGAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Arrange the following layers of the OSI model from the bottom to the top layer:

\_\_ Data Link
\_\_ Application
\_\_ Session
\_\_ Physical
\_\_ Network
\_\_ Presentation
\_\_ Transport
A
Layer 1. Physical
Layer 2. Data Link
Layer 3. Network
Layer 4. Transport
Layer 5. Session
Layer 6. Presentation
Layer 7. Application

Please Do Not Tell Secret Password 2 All

All People Seem To Need Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI layer that manages signals among network systems

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI layer that divides data into frames that can be transmitted by the physical layer

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI layer that translates network addresses and routes data from sender to receiver

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI layer that ensures data are transferred reliably in the correct sequence

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI layer that coordinates and manages user connections

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI layer that formats, encrypts, and compresses data

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSI layer that mediates between software applications and other layers of network services

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following protocols reside at the application layer of the OSI model? Select all that apply.

a. HTTP
b. FTP
c. SMTP
d. NetBIOS
e. ARP

A

a. HTTP
b. FTP
c. SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In the OSI model, physical addressing takes place in:

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5

A

b. Layer 2 - Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following reside at the Physical layer of the OSI model? Select all that apply.

a. Router
b. Hub
c. Switch
d. Network cabling
e. Bridge

A

b. Hub

d. Network cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the OSI model, data compression takes place in:

a. Layer 1
b. Layer 4
c. Layer 6
d. Layer 5

A

c. Layer 6 - Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which OSI layer assumes responsibility for managing network connections between applications?

a. Layer 1
b. Layer 4
c. Layer 6
d. Layer 5

A

d. Layer 5 - Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the name of the data unit used at the OSI physical layer?

a. Bit
b. Frame
c. Packet
d. Segment

A

a. Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the name of the data unit used at the OSI data link layer?

a. Bit
b. Frame
c. Packet
d. Segment

A

b. Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the name of the data unit used at the OSI network layer?

a. Bit
b. Frame
c. Packet
d. Segment

A

c. Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the name of the data unit used at the OSI transport layer?

a. Bit
b. Frame
c. Packet
d. Segment

A

d. Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the name of the data unit used at the OSI session layer?

a. Data
b. Frame
c. Packet
d. Segment

A

a. Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the name of the data unit used at the OSI presentation layer?

a. Data
b. Frame
c. Packet
d. Segment

A

a. Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the name of the data unit used at the OSI application layer?

a. Data
b. Frame
c. Packet
d. Segment

A

a. Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In the OSI model, Media Access Control (MAC) and Logical Link Control (LLC) sublayers are the components of:

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4

A

b. Layer 2 - Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

User Datagram Protocol (UDP) resides at which OSI layer?

a. Layer 4
b. Layer 5
c. Layer 6
d. Layer 7

A

a. Layer 4 - Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Routers operate at which OSI layer?

a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5

A

b. Layer 3 - Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IP addressing takes place at which OSI layer?

a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5

A

b. Layer 3 - Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data encryption and decryption typically takes place at which OSI layer?

a. Layer 4
b. Layer 5
c. Layer 6
d. Layer 7

A

c. Layer 6 - Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following devices resides at the OSI data link layer?

a. Router
b. Passive hub
c. Ethernet switch
d. Repeater

A

c. Ethernet switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following protocols resides at the OSI session layer?

a. HTTP
b. UDP
c. SMTP
d. NetBIOS

A

d. NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Protocol suite used as the de facto standard for the Internet

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The process of adding addressing information to data as it is transmitted down the OSI stack

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A connectionless protocol used where speed is more important than error-checking and guaranteed delivery

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Type of defense in depth implementation that creates a series of nested layers that must be bypassed in order to complete an attack

A

Concentric rings (or Nested layering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Type of defense in depth implementation where two or more controls work in parallel to protect an asset

A

Overlapping redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Type of defense in depth implementation that compartmentalizes access to an asset, requiring two or more processes, controls or individuals to access or use the asset

A

Segregation or compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Type of defense in depth implementation that is effective in protecting very high value assets or in environments where trust is an issue

A

Segregation or compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Type of defense in depth implementation that is most effective when each control is different

A

Ovrelapping redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Type of defense in depth implementation from an architectural perspective where controls are placed in various places in the path of access for an asset (e.g. concentric ring model)

A

Horizontal defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Type of defense in depth implementation from an architectural perspective where controls are placed at different system layers - hardware, operating system, application, database, or user levels

A

Vertical defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are the three types of defense in depth implementations?

A
  1. Concentric Rings (or Nested Layering)
  2. Overlapping Redundancy
  3. Segregation or Compartmentalization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A system or combination of systems that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

True or false: Effective firewalls should prevent individuals on the corporate network to access the Internet and simultaneously prevent others on the Internet from gaining access to the corporate network to cause damage.

A

False: Effective firewalls should ALLOW individuals on the corporate network to access the Internet and simultaneously prevent others on the Internet from gaining access to the corporate network to cause damage.

52
Q

What are the four types of network firewalls?

A
  1. Packet filtering
  2. Application firewall systems
  3. Stateful inspection
  4. Next generation firewall (NGFW)
53
Q

A type of firewall where a screening router examines the header of every packet of data traveling between the Internet and the corporate network

A

Packing filtering firewall

54
Q

True or False: Packet headers contain information, including the IP address of the sender, along with the port numbers authorized to use the information transmitted.

A

False: Packet headers contain information, including the IP address of the sender AND THE RECEIVER, along with the port numbers authorized to use the information transmitted.

55
Q

This type of firewall is most effective when implemented with basic security and monitoring in mind.

A

Packet filtering firewall

56
Q

The following are the more common attacks against packet filter firewalls except:

a. IP spoofing
b. Source routing specification
c. Denial of service attack
d. Miniature fragment attack

A

c. Denial of service attack

57
Q

This type of firewall allows information to flow between systems but do not allow the direct exchange of packets.

A

Application firewall system

58
Q

This the only host computer that a company allows to be addressed directly from the public network. It is designed to screen the rest of its network from security exposure.

A

Bastion host

59
Q

A type of firewall that employs the concept of bastion hosting in it handles all incoming requests from the Internet to the corporate network, such as FTP or web requests.

A

Application firewall system

60
Q

True or false: The difference between an application-level gateway and a circuit-level gateway is that the former uses a proxy for each application-level service while the latter uses only one proxy for all services.

A

True: The difference between an application-level gateway and a circuit-level gateway is that the former uses a proxy for each application-level service while the latter uses only one proxy for all services.

61
Q

This is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.

A

Proxy server

62
Q

It takes private internal network addresses, which are unusable on the Internet, and maps them to a table of public IP addresses assigned to the organization, which can be used across the Internet.

A

Network Address Translation (NAT)

63
Q

A type of firewall that is also referred to as dynamic packet filtering

A

Stateful inspection firewall

64
Q

A type of firewall that tracks the destination IP address of each packet that leaves the organization’s internal network. Whenever a response to a packet is received, its record is referenced to ascertain whether the incoming message was made in response to a request that the organization sent out.

A

Stateful inspection firewall

65
Q

An adaptive network security system that is capable of detecting and blocking sophisticated attacks.

A

Next generation firewall

66
Q

Utilizing a packet filtering router and a bastion host, this approach implements basic network layer security (packet filtering) and application server security (proxy services)

A

Screened-host firewall

An intruder in this configuration must penetrate two separate systems before the security of the private network is compromised. This is configured with the bastion host connected to the private network with a packet filtering router between the Internet and the bastion host.

N.B. This is a hybrid of packet filtering firewall and application firewall system.

67
Q

This is a firewall system that has two or more network interfaces, each of which is connected to a different network.

A

Dual-homed firewall

This is a more restrictive form of a screened-host firewall in which a dual-homed bastion host is configured with one interface established for information servers and another for private network host computers.

68
Q

This is a small, isolated network for an organization’s public servers, bastion host information servers, and model pools.

A

Demilitarized zone (DMZ) or screened-subnet firewall

DMZ connects untrusted network to the trusted network, but it exists in its own independent space to limit access and availability of resources. As a result, external systems can access only the bastion host and possibly information servers in the DMZ.

69
Q

Groups of devices on one or more logically segmented LAN.

A

VLAN

A VLAN is set up by configuring ports on a switch, so devices attached to these ports may communicate as if they were attached to the same physical network segment, although the devices are actually located on different LAN segments.

70
Q

A network segment that places limited systems, applications, and data in a public-facing segment.

A

Demilitarized zone (DMZ)

71
Q

Refers to network communication coming in

A

Ingress

72
Q

Refers to network communication going out

A

Egress

73
Q

True or false: Host-based methods of detecting unknown malware use specific techniques to identify common malicious code behaviors and flag them as suspicious.

A

False: Heuristic-based methods of detecting unknown malware use specific techniques to identify common malicious code behaviors and flag them as suspicious.

74
Q

A security element that works in conjunction with routers and firewalls by monitoring network usage anomalies.

A

IDS

75
Q

The following are limitations of an IDS except:

a. Complex configuration
b. Application-level vulnerabilities
c. Back doors into applications
d. Weaknesses in identification and authentication schemes

A

a. Complex configuration

76
Q

True or False: Using statistical-based IDS is better than using signature-based IDS.

A

False: Signature-based IDSs are not able to detect all types of intrusions due to limitations of their detection rules. On the other hand, statistical-based systems may report many events outside of the defined normal activity that are still normal activities on the network. A combination of signature-based and statistical-based models provides better protection.

77
Q

The process of converting a plaintext message into a secure-coded form of text

A

Encryption

78
Q

True or False: Encryption can prevent the loss of data.

A

False: Encryption is limited in that it cannot prevent the loss of data.

79
Q

What are the key elements of cryptographic systems?

A
  1. Encryption algorithm
  2. Encryption key
  3. Key length
80
Q

Mathematically based function or calculation that encrypts or decrypts data

A

Encryption algorithm

81
Q

Piece of information similar to a password that makes the encryption or decryption process unique

A

Encryption key

82
Q

Predetermined length for the key

A

Key length

83
Q

True or False: The longer the key, the more difficult it is to compromise in a brute force attack where all possible key combinations are tried.

A

True

84
Q

The use of a single, secret, bidirectional keys that encrypt and decrypt

A

Symmetric key system

85
Q

Uses pairs of unidirectional, complementary keys that only encrypt or decrypt

A

Asymmetric key system

86
Q

True or false: Public key systems are asymmetric cryptographic systems.

A

True

87
Q

The most common symmetric key cryptographic system

A

Data Encryption Standard (DES)

88
Q

True or False: DES uses blocks of 64 bits.

A

True

89
Q

The following are examples of symmetric cryptographic system except:

a. DES
b. AES
c. IDEA
d. RSA

A

d. Rivest-Shamir-Adleman (RSA) is the most commonly used asymmetric algorithm (public key algorithm). It can be used both for encryption and for digital signatures. The security of RSA is generally considered equivalent to factoring, although this has not been proven.

90
Q

The next generation of cryptography that may solve some of the existing procedures associated with current cryptographic system specifically the random generation and secure distribution of symmetric cryptographic keys

A

Quantum cryptography

91
Q

A variant and more efficient form of public cryptography that demands less computation power and therefore offers more security per bit. Its 160-bit key offers the same security as an RSA-based system with a 1,024-bit key.

A

Elliptical Curve Cryptography (ECC)

92
Q

It has replaced DES as the cryptographic algorithm standard.

A

Advanced Encryption Standard (AES)

93
Q

The following are different versions of AES except:

a. AES-128
b. AES-192
c. AES-248
d. AES-256

A

c. AES-248

94
Q

An electronic identification of a person or entity created by using a public key algorithm.

A

Digital signature

95
Q

Defined as a cryptographic hashing algorithm

A

Checksum

96
Q

Is composed of a public key and identifying information about the owner of the public key.

A

Digital signature

97
Q

An authority in a network that issues and manages security credentials and public keys for message signature verification or encryption.

A

Certificate authority (CA)

98
Q

An authority in a network that verifies the user requests for a digital certificate and tells the CA to issue it.

A

Registration Authority (RA)

99
Q

An instrument for checking the continued validity of the certificates for which the CAS has responsibility

A

Certificate Revocation List (CRL)

100
Q

A session- or connection-layered protocol widely used on the Internet for communication between browsers and web servers, in which any amount of data is securely transmitted while a session is established.

A

Secure Sockets Layer (SSL)

101
Q

It is an application layer protocol that transmits individual messages or pages securely between a web client and server by establishing an SSL-type connection.

A

Hypertext Transfer Protocol Secure (HTTPS)

102
Q

An IP network layer protocol that establishes VPN via transport and tunnel mode encryption methods

A

IPSec

103
Q

A client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon

A

Secure Shell (SSH)

104
Q

A standard secure email protocol that authenticates the identity of the sender and receiver, verifies message integrity, and ensures the privacy of a message’s contents, including attachments

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

105
Q

A protocol developed jointly by VISA and MasterCard to secure payment transactions among all parties involved in credit card transactions

A

Secure Electronic Transaction (SET)

106
Q

Select all that apply. The Internet perimeter should:

a. Detect and block traffic from infected internal end points.
b. Eliminate threats such as email spam, viruses and worms.
c. Format, encrypt, and compress data.
d. Control user traffic bound toward the Internet.
e. Monitor and detect network ports for rogue activity.

A

a. Detect and block traffic from infected internal end points.
b. Eliminate threats such as email spam, viruses and worms.
d. Control user traffic bound toward the Internet.
e. Monitor and detect network ports for rogue activity.

107
Q

The ___ layer of the OSI model ensures that data are transferred reliably in the correct sequence, and the ___ layer coordinates and manages user connections.

a. Presentation, data link
b. Transport, session
c. Physical, application
d. Data link, network

A

b. Transport, session

108
Q

Select all that apply. The key benefits of the DMZ system are:

a. DMZs are based on logical rather than physical connections.
b. An intruder must penetrate three separate devices.
c. Private network addresses are not disclosed to the Internet.
d. Excellent performance and scalability as Internet usage grows.
e. Internal systems do not have direct access to the Internet.

A

b. An intruder must penetrate three separate devices.
c. Private network addresses are not disclosed to the Internet.
e. Internal systems do not have direct access to the Internet.

109
Q

Which of the following best states the role of encryption within the overall cybersecurity program?

a. Encryption is the primary means of securing digital assets.
b. Encryption depends upon shared secrets and is therefore an unreliable means of control.
c. A program’s encryption elements should be handled by a third-party cryptologist.
d. Encryption is an essential but incomplete form of access control.

A

d. Encryption is an essential but incomplete form of access control.

110
Q

The number and types of layers needed for defense in depth are a function of:

a. Asset value, criticality, reliability of each control and degree of exposure
b. Threat agents, governance, compliance and mobile device policy
c. Network configuration, navigation controls, user interface and VPN traffic
d. Isolation, segmentation, internal controls and external controls

A

a. Asset value, criticality, reliability of each control and degree of exposure

111
Q

Which of the following is an example of a stream symmetric cryptography?

a. DES
b. AES
c. IDEA
d. RC4

A

d. RC4 is very fast and encrypts one bit of data at a time. While remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.

112
Q

What are the two kinds of symmetric cryptography?

A
  1. Stream - very fast and encrypts one bit of data at a time

2. Block - divides the data into groups before encryption (e.g. 128-bit encryption, 64-bit encryption, etc.)

113
Q

Select all that apply. Symmetric cryptography is also known as:

a. Private key cryptography
b. Secret key cryptography
c. Session key cryptography
d. Public key cryptography

A

a. Private key cryptography
b. Secret key cryptography
c. Session key cryptography

Public key cryptography is another term for asymmetric cryptography.

114
Q

Which of the following is addressed by symmetric cryptography?

a. Confidentiality
b. Integrity
c. Authenticity
d. Non-repudiation

A

a. Confidentiality

115
Q

In symmetric cryptography, what is the formula in determining how many keys to be used for N number of people?

A
  2
116
Q

True or False: To achieve privacy, the receiver’s public key is used to encrypt the message.

A

True: Using the receiver’s public key to send the message will allow the receiver to use his private key to decrypt and read the message. Since the private key is only known to him, privacy is achieved.

117
Q

True or false: To achieve non-repudiation, the sender’s public key is used to encrypt the message.

A

False: The sender has to encrypt the message using his private key so that, when the receiver decrypts and reads the message using the sender’s public key, he can guarantee that it came from the sender and the sender alone.

118
Q

True or false: Using a hashing function allows for the confidentiality of the encrypted message.

A

False: Using a hashing function allows for the integrity of the encrypted message.

119
Q

How many keys do 5 people need when using asymmetric encryption?

a. 1
b. 5
c. 10
d. 20

A

c. 10

Formula for asymmetric cryptography is 2N.

Compare symmetric cryptography where number of keys =
N * (N-1)
———–
2

120
Q

Select all that apply. Which of the following are asymmetric algorithms?

a. DSA
b. RSA
c. ECC
d. El Gamal
e. Diffie Hellman
f. Knapsack
g. IDEA
h. CAST
i. Blowfish
j. Two Fish

A

a. DSA
b. RSA
c. ECC
d. El Gamal
e. Diffie Hellman
f. Knapsack

Tip: For purposes of the exam, there are only six known asymmetric algorithms (see above) compared to a LOT of different symmetric algorithms. Hence, it would be more practical to remember the above six asymmetric algorithms rather than also trying to memorize all the symmetric algorithms.

The rule is: If it’s not one of the six, then they’re symmetric algorithms.

121
Q

A type of asymmetric algorithm that is currently the standard of digital signature mechanism

A

RSA

122
Q

It is the first asymmetric algorithm

A

Diffie-Hellman

Diffie-Hellman is a secure key agreement without pre-shared secrets. It is based on a discrete algorithm in a finite field.

123
Q

A type of asymmetric algorithm that is very efficient but is only commonly used for handheld devices due to their limited processing capability.

A

Elliptical Curve Cryptography (ECC)

124
Q

Which of the following hash has a 160-bit length?

a. MD5
b. SHA-1
c. SHA-2
d. SHA-3

A

a. SHA-1 = 160 bits

MD-5 = 128 bits

SHA-2 = 224, 256, 384 or 512 bits
(e.g. SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256); commonly used is SHA-256

SHA-3 = 224, 256, 384 or 512 bits (recently, from NIST competition)

125
Q

A protocol used to streamline the process of verifying whether or not a certificate has been revoked.

A

Online Certificate Status Protocol (OCSP)