Securing TCP/IP Flashcards
Any encryption that uses the same key for encryption and decryption is called?
Encoded key
Symmetric key
Single key
Symmetric key
Symmetric-key encryption uses the same key
RC4 is a(n) _______________ cipher.
forwarding
stream
asymmetric
stream
RC4 is a stream cipher
In a PKI encryption method, which key encrypts the data?
Public
Private
Both
Public
You send someone a public key that he or she, in turn, uses to encrypt the data. The private key can decrypt data encrypted with the public key
The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be is called _______________.
authentication
locking
nonrepudiation
nonrepudiation
This is the definition of nonrepudiation
A hash function is by definition a _______________.
complex function
PKI function
one-way function
one-way function
Hash functions must be one-way. They should be complex, but complexity is not a requirement
Which of the following is a common hash function?
SHA-3
RC4
AES
SHA-3
Of the choices listed, only SHA-3 is a hash function
In order to have a PKI you must have a(n) _______________.
Web of trust
root authority
unsigned certificate
root authority
A PKI must have a root authority
Which type of access control requires a label to define its sensitivity?
MAC
DAC
RBAC
MAC
Mandatory access control must use a label to define sensitivity
If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running?
PPP
RADIUS
MS-CHAP
RADIUS
RADIUS uses UDP ports 1812 and 1813
Which authentication standard is highly time sensitive?
RADIUS
802.1X
Kerberos
Kerberos
All Kerberos tickets are timestamped