Week 5 | 8.1 & 8.2 & 8.3 & 8.4 & 8.6 Flashcards

1
Q

what are elements of safe comunication

A

Message integrity
operational security
confidentiality
end point autentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

who keeps track of attacks in a database

A

CERT Coordination Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what three scenarios are there where an intruder can obtain informationwhat three

A

Cipher-only attack
brute force
known-plaintext
chosen-plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the two concerns that a public and private key bring

A

een indringer kan het gecodeerde bericht van A onderscheppen
De coderingsleutel van B is openbaar, iedereen kan een gecodeerd bericht naar B sturen of beweren dat zij A zijn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the two components of RSA

A

de keuze van de public key en private key
het coderings en decoderingsalgoritme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does a hash do

A

controleert een invoer en berekent een string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

who binds a public key to an entity

A

certificeringsinstantie (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the role of a CA

A

CA verifieert een entiteit
CA maakt een certificaat dat de openbare sleutel aan de entiteit bindt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly