Security Flashcards

1
Q

CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption

A

Same key is used to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ciphertext

A

encrypted text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did Rivest-Shamir-Adleman create

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric Encryption

A

Uses a Public Key and a Private Key, which together are known as a key pair. The public key can only encrypt. The Private key can only decrypt. People exchange public keys to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

popullar hash algoithmes

A

md5

sha-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RADIUS

A

An AAA that uses UDP ports 1812-1813 or UDP ports 1645-1646.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TACACS+

A

An AAA that uses TCP port 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerberos

A

Authentication of local area networks.
It handles authentication and authorization for wired networks.
It relies heavily on time stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

key Distribution Center (KDC)

A

Consists of two services: AS and TGS.
AS: Authentication Service
TGS: Ticket-Granting Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Extensible Authentication Protocol (EAP)

A

enables flexible authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly