Week 1: Security Rules Flashcards

1
Q

What is a bit?

A

Basic bit of information: 0 or 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a nibble?

A

Half a byte (4 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a hexadecimal value?

A

base 16 value (0-9, A-F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 7 layers of the OSI model?

A
Layer 1: Physical Layer
Layer 2: Data Link Layer
Layer 3: Network Layer
Layer 4: Transport Layer
Layer 5: Session Layer
Layer 6: Presentation Layer
Layer 7: Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI: What is the Physical Layer?

A
  • 1st and lowest layer
  • transmits raw bits
  • converts electrical bits to electrical, radio or optical signals
  • ie. wiring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI: What is the Data Link Layer?

A
  • 2nd layer
  • node to node data transfer
  • everything with MAC address
  • ie. switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI: What is the Network Layer?

A
  • 3rd layer
  • routes data packets
  • everything with router and IP address
  • ie. router, TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI: What is the Transport Layer?

A
  • 4th layer

- how much information is communicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI: What is the Application Layer?

A
  • 7th and most top layer
  • application being used to send/receive information
  • ie. browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI: What is the Presentation Layer?

A
  • 6th layer

- ie. Operating system with firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI: What is the Session Layer?

A
  • 5th layer

- creates session between your computer and another computer/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two security rules?

A
  1. Don’t roll your own.

2. Kerckhoff’s Principle - secrecy of message should not depend on secrecy of algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the Caesar Cipher work?

A

Gen() - number key
Enc() - shift all letters forward by number key
Dec() - shift all letters backward by number key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the Vigenere Cipher work?

A

Gen() - word key
Enc() - write out repeated word key underneath message and combine char values to create cipher text
Dec() - subtract word key repeatedly from ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly