itm 446 cyber security

¡Supera tus tareas y exámenes ahora con Quizwiz!

A certificate repository (CR) is a publicly accessible centralized directory of digital certificates A) True B) False

A

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result. A) True B) False

A

What protocol developed by Netscape in 1994 is designed to create an encrypted data path between a client? A) SSL B) TLS C) PEAP D) EAP

A

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files? A) full disk encryption B) system encryption C) OS encryption D) disk encryption

A

What type of cryptographic algorithm creates a unique digital fingerprint of a set of data? A) hash B) key C) digest D) block

A

What type of cryptography uses two keys instead of just one generating both a private and a public key? A) asymmetric B) symmetric C) shared D) open

A

When Bob needs to send Alice a message with a digital signature whose private key is used to encrypt the hash? A) Bob's private key B) Alice's private key C) Bob and Alice's key D) Bob's private key and Alice's public key

A

Wireless data networks are particularly susceptible to known ciphertext attacks. A) True B) False

A

Secure Shell (SSH)

A Linux/UNIX-based command interface and protocol for securely accessing a remote computer.

Secure Sockets Layer (SSL)

A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data. uses AES

root digital certificate

A certificate that is created and verified by a CA.

Trusted Platform Module (TPM)

A chip on the motherboard of the computer that provides cryptographic services.

Block Cipher

A cipher that manipulates an entire block of plaintext at one time.

Public Key Infrastructure (PKI)

A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates.

cryptographic algorithm

A mathematical computation used to encrypt and decrypt data. (cipher)

key

A mathematical value entered into a cryptographic algorithm to produce cyphertext

Certificate Repository (CR)

A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate.

Certificate Revocation List (CRL)

A repository that lists revoked digital certificates.

Secure Hash Algorithm (SHA)

A secure hash algorithm that creates hash values of longer lengths than Message Digest (MD) algorithms.

TLS (Transport Layer Security)

A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP/IP connection.

Certificate Signing Request (CSR)

A structured message sent to a certificate authority requesting a digital certificate.

digital certificate

A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by a trusted third party.

Stream Cipher

An algorithm that takes one character and replaces it with one character.

Downgrade Attack

An attack in which the system is forced to abandon the current higher security mode of operation and fall back to implementing an older and less secure mode.

Collision Attack

An attempt to find two input strings of a hash function that produce the same hash result.

A common use of TLS and SSL to secure a communication between browser and web server A) http B) https C) ftp D) ssh

B

Digital certificates should last forever A) True B) False

B

Stream ciphers work on multiple characters at a time. A) True B) False

B

The simplest type of stream cipher, one in which one letter or character is exchanged for another is known as what? A) shift B) substitution C) lock D) loop

B

What alternative term can be used to describe asymmetric cryptographic algorithms? A) user key cryptography B) public key cryptography C) private key cryptography D) cipher-text cryptography

B

Which of the following asymmetric cryptography algorithms is most commonly used? A) AES B) RSA C) Twofish D)TPM

B

Why is IPsec considered dto be a transparent security protocol? A) Ipsec packets can be viewed by anyone B) IPsec is designed to not require modifications of programs, or additional training, or additional client C) IPsec's design and packet header contents are open sourced technologies D)IPsec uses the Transparent Encryption (TE) algorithm

B

In which type of encryption is the same key used to encrypt and decrypt data? A) private B) public C) symmetric D) asymmetric

C

Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates: A) Registration Authority B) Delegation Authority C) Certification Authority D) Participation Authority

C

What term best represent the resiliency of a cryptographic key to attacks? A) key bits B) key resiliency C) key strength D) key space

C

Which of the following is more secure than software encryption? A) private encryption B) application encryption C) hardware encryption D) full disk encryption

C

wildcard digital certificate

Certificate used to validate a main domain along with all subdomains.

decryption

Changing secret message back to original form

Certificate Life Cycle

Creation Suspension Revocation Expiration

asymmetric cryptographic algorithm

Cryptography that uses two mathematically related keys. also known as public key cryptography.

At what stage can a certificate no longer be used for any type of authentication? A) creation B) suspension C) revocation D) expiration

D

Data that is in an unencrypted form is referred to as which of the following? A) cryptext B) plain text C) simpletext D) cleartext

D

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data? A) confidentiality B) availability C) encryption D) integrity

D

What cryptographic transport algorithm is considered to be significantly more secure than SSL? A) AES B) HTTPS C) ESSL D) TLS

D

What term describes data actions being performed by endpoint devices such as printing a report from a desktop computer? A) data-in-transit B) data-in-play C) data-at-rest D) data-in-use

D

Which of the following is not one of the function of a digital signature? A) verification of the sender B) prevention of the sender from disowning the message C) prove the integrity of the message D) protect the public key

D

cleartext data

Data stored or transmitted without encryption

confidentiality

Ensures that only authorized parties can view the information

Asymmetric cryptographic algorithms are also known as private key cryptography

False

Obfuscation is making something well known or clear

False

Steganography

Hiding the existence of data within a text, audio, image, or video file. something can contain hidden messages embedded in the file may hide data in the file header fields that describe the file.

certificate chaining

Linking several certificates together to establish trust between all the certificates involved.

obfuscation

Making something obscure or unclear.

Improper implementation

Many cryptographic algorithms have several configuration options • Unless careful consideration is given to these options the cryptography may be improperly implemented

using deprecated algorithms

Means to use a cryptographic algorithm that should not be used because of known vulnerabilities

non-repudiation

Proves that a user performed an action

user digital certificate

The end-point of the certificate chain.

key strength

The resiliency of a key to resist attacks.

two encryption modes of IPsec

Transport: leaves header unencrypted tunnel: Encrypts both the header and the data portion

Ciphertext is the scrambled and unreadable output of encryption

True

In information technology, non-repudiation is the process of proving that a user performed an action

True

Plaintext

Unencoded data. Also known as cleartext.

Pretty Good Privacy (PGP)

Widely used asymmetric cryptography system Used for files and e-mails on Windows systems

HTTPS (Hypertext Transfer Protocol Secure)

a common use of TLS and SSL. secure version is actually "plain" http sent over SSL or TLS

key escrow

a control procedure whereby a trusted party is given a copy of a key used to encrypt database data. both halves are encrypted. They expire after a set period of time and can be renewed

Secure/Multipurpose Internet Mail Extensions

a protocol for securing messages allows users to send encrypted messages that are also digitally signed

IP Security (IPsec)

a transparent security protocol 3 areas of protection: authentication confidentiality key management

pseudorandom number generator

an algorithm for creating a sequence of numbers whose properties approximate those of a random number.

XOR cipher

based on the binary operation exclusive or that compares two bits.

Birthday Attack

based on the birthday paradox, which says that for there to be a 50 percent chance that someone in a given room shares your birthday, 253 people would need to be in the room

encryption

changing original text into a secret message using cryptography

Hash algorithm

creates a unique 'digital fingerprint" of a set of data and is commonly called 'hashing'

what 3 states can cryptography provide protection to data?

data in-use data in-transit data at-rest

What is metadata?

data used to describe the content or structure of the actual data.

File and File System Cryptography

encryption softare can be used to encrypt or decrypt files one-by-one

integrity

ensures info is correct and unaltered

authentication

ensures sender can be verified through cryptography

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties

false

diffusion

if a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing

Cryptographic Transport Protocols

most common cryptographic transport algorithms: Secure Sockets Layer • Transport Layer Security • Secure Shell • Hypertext Transport Protocol Secure • S/MIME • Secure Real-time Transport Protocol • IP Security

Message Digest 5 (MD5)

most well known of the md hash algorithms

weaknesses of digital signature

only shows that the private key of the sender was used to encrypt the digital signature imposter could post a public key under a senders name

three primary characteristics that determine the resiliency of the key to attacks

randomness length cryptoperiod

Certificate Authority (CA)

responsible for digital certificates. also called root CA

Types of Digital Certificates

root domain hardware and software

cryptography

scrambling information so that it cannot be read. transforms information into secure form so unauthorized people cannot access it.

Substitution Cipher

substitute one value for another ROT13 is one type.

sponge function

takes as input a string of any length and returns a string of any requested variable length

confusion

the key does not relate in a simple way to the ciphertext

ciphertext

the scrambled and unreadable output of encryption

symmetric cryptographic algorithm

use the same single key to encrypt and decrypt a document. also called private key cryptography

Trusted third party

used to help solve the problem of verifying identity verifies the owner and that the public key belongs to that owner

digital signature

used to prove a document originated from a valid sender

Domain Validation

verifies the identity of the entity that has control over the domain name


Conjuntos de estudio relacionados

ENGLISH PLUS 1, STARTER UNIT: PREPOSITIONS - English x English/pictures

View Set

Ch. 9 Statistical Process Control (SPC)

View Set

Chapter 2: Traditional Health Beliefs and Practices

View Set

Chapter 5 - Adjustments and the Worksheet

View Set

Electrical Engineering Fundamentals of Engineering Review Material

View Set

French Oral Questions: Junior Cert

View Set

CH 40 Disorders of the Female Genitourinary System NCLEX

View Set

Chapter 24 GRINDING AND OTHER ABRASIVE PROCESSES

View Set