Global Security Chapter 3 & 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of these is not a characteristic of a secure hash algorithm?

Collisions should be rare.

Plaintext

Data called that is to be encrypted by inputting it into a cryptographic algorithm.

Extended Validation (EV) Certificate

Digital certificate displays the name of the entity behind the website.

Crypto Service Provider

Entity calls in crypto modules to perform cryptographic tasks.

Hardware Security Module (HSM)

Has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form.

Hashed Message Authentication Code (HMAC)

Hashes the key and the message.

Alice's public key

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Which areas of a file cannot be used by steganography to hide data?

In the directory structure of the file system.

Which statement is not true regarding hierarhical trust models?

It is designed fro use on a large scale.

Trusted Platform Module (TPM)

It provides cryptographic services in hardware instead of software.

Diffie-Hellman (DH)

Key exchange uses the same keys each time.

Risk Loss

Not a basic security protection for information that cryptography can provide.

Variability

Not a method for strengthening a key.

Digest

Not decrypted but is only used for comparison purposes.

Authorization

Not part of the certification life cycle.

Online Certificate Status Protocol (OCSP)

Performs real-time lookup of a certificate's status

Non-repudiation

Proving that a user sent and email message.

Perfect Forward Secrecy

Public key systems that generate random public keys that are different for each session.

Advanced Encryption Standard

Strongest symmetric cryptographic algorithm.

Session Keys

Symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Certificate Repository (CR)

A centralized directory of digital certificates is called a(n) ________.

Secure Shell (SSH)

A protocol for securely accessing a remote computer.

Certification Policy (CP)

A published set of rules that govern the operation of a PKI.

Key Escrow

A situation in which keys are managed by a third party, such as a trusted CA.

Salt

A value that can be used to ensure that hashed plaintext will not consistently result in the same digest.

0

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?

Certificate Authority (CA)

An entity that issues digital certificates.

Verify the Receiver

Benefits the digital signature cannot provide.

Cipher Block Chaining (CBC)

Block ciphers XORs each block of plaintext with the previous block of cipher text before being encrypted.

Confusion

The key should not relate in a simple way to the cipher text.

ROT13

The key showed that the entire alphabet was rotated 13 steps.

SHA-3

The latest version of the Secure Hash Algorithm.

Public Key Infrastructure (PKI)

The management of digital certificates.

RSA

The most secure asymmetric cryptographic algorithm.

TLS v1.2

The strongest cryptographic transport protocol.

Digital Certificate

The strongest technology that would assure Alice that Bob is the sender of a message.

A digital certificate associates

The user's identity with his public key

Digital certificates can be used fro each of these except

To verify the authenticity of the Registration Authorizer.

Bridge

Which trust model has multiple CAs, one of which acts as a facilitator?


Ensembles d'études connexes

DBA 120: Database Programming I - Chapter 2 (uCerfity)

View Set

CH. 62 Caring for Clients With Traumatic Musculoskeletal Injuries

View Set

Chapter 27 Reproductive Test Practice Q's

View Set

Maryland Real Estate (Law) Chapter 2 - Agency

View Set

NURS 10060 ch. 09 + 13 + 16 notes + questions

View Set