Security Flashcards

1
Q

What is encryption at rest?

A

The encryption of persistent data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What contains an Access Token?

A

The security credentials for a login session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SOCKS

A

An internet protocol that exchanges packets from client to server through a proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack does HTTPS protect from?

A

Man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a public key certificate?

A

An electronic document used to prove the ownership of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TLS?

A

Transport Layer Security

Cryptographic protocols used to provide security over a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SSL replaced by?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 layers of the TLS protocol?

A

TLS record

TLS handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protocol is responsible for encryption in HTTPS?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of cipher is used in public key cryptography?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What entity assigns digital certificates?

A

CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the control protocol called at the beginning of a TLS connection?

A

Handshake
This protocol is used to exchange all the information required by both sides for the exchange of the actual application data by TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What proves the ownership of a public key?

A

A digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Through what is Alice’s message transferred to Bob?

A

The medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is the attacker?

A

Eve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In cryptography, does Even access to the medium?

A

Yes

17
Q

What is the goal of cryptography?

A

Protect the plaintext against Eve

18
Q

What is the plaintext letter in cryptography?

A

p

19
Q

What is the ciphertext letter in cryptography?

A

c

20
Q

What is the cipher?

A

The algorithm used to convert the plaintext to the ciphertext

21
Q

What is the key?

A

Information only known by Alice and Bob

22
Q

What is p – c?

A

Encryption

23
Q

What is c – p?

A

Decryption

24
Q

What does the cipher typically use for encryption?

A

The key

25
Q

How do you call the study of codebreaking?

A

Cryptanalysis

26
Q

How do you call the study of codebreaking and encryption?

A

Cryptology

27
Q

What is an alphabet in cryptography

A

The minimal information for information coding

28
Q

What composes the CIA triad?

A

Confidentiality, Integrity, and Availability

29
Q

What is commonly used for data integrity verification?

A

Hash values