Test 5 Flashcards

1
Q

SHA

Test 5

A

SHA (Security Hash Algorithm) - Family of hash functions designed for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA-3

Test 5

A

SHA-3 (Secure Hash Algorithm 3) - the latest hash standard offering the most secure hash functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

Test 5

A

HMAC (Hash Based Message Authentication Code) - authenticates data by using a hash algorithm combined with a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CRC

Test 5

A

CRC (Cyclic Redundancy Check) - an error-detecting hash function used to ensure data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Salting

Test 5

A

Salting - a technique used to secure passwords by adding random data to a password before it is hashed, reducing brute force, dictionary and rainbow attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refer to algorithms used for generating and verifying digital signatures? (Select 3 answers)

Test 5

A

ECDSA
RSA
DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DSA

Test 5

A

DSA (Digital Signature Algorithm) - a system designed for creating and verifying digital signatures but is not an encryption algorithm like RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA

Test 5

A

RSA (Rivest, Shamir, Adleman) - a system using public/private keys to encrypt data for secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECDSA

Test 5

A

ECDSA (Elliptic Curve Digital Signature Algorithm) - is a method using ECC, for creating digital signatures with shorter keys and faster processing times. Has no native encryption function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key stretching

Test 5

A

Key stretching makes passwords more secure by applying resource-intensive algorithms making it less suseptible to brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PBKDF2

Test 5

A

PBKDF2 (Password Based, Key Derivation Function 2) - uses a key stretching algorithm to create a secure key from a password by taking a password, adding a random salt value and hash functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open Public Ledger

Test 5

A

a shared distributed database accessible to everyone, such as Blockchain technology, that uses a P2P network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PKCS

Test 5

A

PKCS (Public Key Cryptography Standards) - a collection of standards that define various cryptographic techniques such as private/public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

P12 file format

Test 5

A

A secure archive that bundles a digital certificate with a private key for encryption/decryption, used to transfer between different programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital certificate

Test 5

A

A digital document that verifies the identity of an entity online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of Registration Authority (RA) in PKI?

Test 5

A

RA (Registration Authority) is a third party working for a CA that authorizes entities and individuals applying for digital certificates but do not issue the digital certificates themselves.

17
Q

CRL

Test 5

A

CRL (Certificate Revocation List)
a list published by the CA (Certificate Authority) of all the revoked digital certificates.

18
Q

OCSP

Test 5

A

OCSP (Online Certificate Status Protocal)
an internet protocol /fastest way that lets you check the revocation status of a digital certificate in real-time