Shared Flashcard Set

Details

CNT 4403 by Patricia Wells Exam 1
CNT 4403 by Patricia Wells Exam 1
150
Computer Science
Undergraduate 4
02/26/2013

Additional Computer Science Flashcards

 


 

Cards

Term

(Chapter 1)

What are the three decision making strategies?

Definition
  1. Rule based decisions - follow a rule
  2. Relativistic decisions - copy others
  3. Rational - looks at risks and chooses measures accordingly
Term

(Chapter 1)

What are the six phases of the security process?

Definition
  1. Identify the assets
  2. Analyze the risks of attack
  3. Establish your security policy
  4. Implement your defenses
  5. Monitor your defenses
  6. Recover from attacks
Term

(Chapter 1)

Assets are protected by a ___

Definition

boundary

Term

(Chapter 1)

Openings in the boundary are ___ 

Definition

vulnerabilities

Term

(Chapter 1)

A ___ tries to attack assets

Definition

threat agent, attacker

Term

(Chapter 1)

A ___ protects the assets.

Definition

defense, safeguard, countermeasure

Term

(Chapter 1)

What is CIA?

Definition

confidentiality, integrity, availability

Term

(Chapter 1)

What are the 5 recognized services that security mechanisms might provide?

Definition
  1. confidentiality
  2. integrity
  3. availability
  4. authentication
  5. nonrepudiation
Term

(Chapter 1)

All attacks fall into which 6 categories?

Definition
  1. physical theft
  2. denial of service
  3. subversion
  4. masquerade
  5. disclosure
  6. forgery
Term

(Chapter 1)

What are the pros and cons of responsible disclosure?

Definition

Pro: gives vendors an opportunity to release a patch 

before making the vulnerability public

Con: vendors may not act promptly

Term

(Chapter 1)

What are the pros and cons of full disclosure?

Definition

Pro: May result in faster response times from vendors

Con: May inform malicious parties of vulnerabilities 

before they are patched

Term

(Chapter 2)

What is a buffer overflow attack?

Definition

it is when an attacker provides input that exceeds the buffer length

Term

(Chapter 2)

What is shellcode?

Definition

It is the name applied to malicious code that 

allows an attacker to issue further commands

Term

(Chapter 2)

What is a sled attack?

Definition

It is a sequence of instructions responsible for directing the flow of control towards the core code of a buffer overflow attack.

Term

(Chapter 2)

What is No-Op?

Definition

Machine instruction that does nothing except move to the next instruction

Term

(Chapter 2)

What is a trampoline sled?

Definition

instead of a sliding along no-ops, this sled contains control transfer instructions all pointing directly to the shellcode

Term

(Chapter 2)

What is Return-to-libc attack?

Definition

Overwrites return address with a call to the desired library function.

Term

(Chapter 2)

What is a Canary?

Definition

It is a value placed between a buffer and control data.

Term

(Chapter 2)

What is Point-Guard?

Definition

It adds code which XOR-encodes pointers (including return address) before and after they are used.

Term

(Chapter 2)

What is Address Space Layout Randomization (ASLR)?

Definition

It randomly rearranges the data of a process's address space making it extremely difficult to predict where to jump in order to execute code.

Term

(Chapter 2)

What is a heap?

Definition

It is a portion of memory allocated dynamically for use by the program

Term

(Chapter 2)

What is a memory leak?

Definition

It is memory allocated on the heap that 

was not explicitly deallocated (freed)

Term

(Chapter 2)

What does data execution prevention do?

Definition

It only executes instructions in a control section

Term

(Chapter 2)

What are the 4 main strategies to control access?

Definition
  1. Islands
  2. Vaults
  3. Puzzles
  4. Patterns
Term

(Chapter 2)

What are the 3 main categories of controls?

Definition

Preventative, detective, and corrective

Term

(Chapter 2)

What are the 6 classifications of security controls?

Definition
  1. physical - e.g. walls
  2. mechanical - protection that changes by mechanical intervention
  3. logical- protection controlled by a structured set of rules or configuration data
  4. functional - protection via the design and operation of functions in the system
  5. procedural - protection from compliance with explicitly defined operation procedures
  6. cryptographic -  protection based on transformation of the data using cryptographic techniques
Term

(Chapter 3)

What is CRUD?

Definition

Create, Read, Update, Delete permissions

Term

(Chapter 3)

What is the difference between global and tailored policies?

 

Definition

Global is applied to all users by defualt and tailored is for specific sets of files

Term

(Chapter 3)

What is the difference between Deny by Default and Default Permit policy?

Definition

Deny by Defaut provides no access to anyone unless specifically granted while Default Permit provides permission for everything except for what is specifically prohibited.

Term

(Chapter 3)

What is Cluster by columnn?

Definition
A capability-based security that associates access rights with users or processes
Term

(Chapter 3)

What is Cluster by Row?

Definition
A file permissions that associates access rights with resources such as files
Term

(Chapter 3)

What is a state diagram?

Definition
A technique to illustrate a system’s behavior.
Term

(Chapter 3)

What are the three information states?

Definition

Storage, processing, and transmission

Term

(Chapter 3)

What is Window of Vulnerability?

Definition

It is the time during which an exploit exists but computers aren't patched.

Term

(Chapter 4)

How do user groups work?

Definition

Each file has a set of group access rights, and the ID 

of an established group of users

Term

(Chapter 4)

Traditional Unix uses ___ ___ ___ to indicate access rights.

Definition

file permission flags

Term

(Chapter 4)

What are the three sets of RWX flags?

Definition

user, group, and other

Term

(Chapter 4)

What is the best general approach for building effective ACLs?

Definition

Deny by Default

Term

(Chapter 4)

In Windows, creating or copying a new file: the file ___ access rights from the 

enclosing folder

Definition

inherits 

Term

(Chapter 4)

When moving a file or folder, it ___ its ACL but ___ the inheritence relationship from its previous location and ___ from the new location

 

Definition

retains, breaks, does NOT inherit

Term

(Chapter 4)

What is transitive trust?

Definition

– If we trust Program 1, and it trusts Program 2, then we are also trusting Program 2

– If we run a program, then we trust its author

Term

(Chapter 4)

What are ANSI X-standards?

Definition

Used by the banking industry to protect electronic funds 

transfers

Term

(Chapter 4)

What is PCI-DSS? 

Definition

Used by “Payment Card Industry” to protect credit card 

transactions

Term

(Chapter 4)

What is ISO 27000?
Definition

Family of international standards for security system 

quality improvement

Term

(Chapter 5)

What is the recovery process from a compromise called?
Definition

remediation

Term

(Chapter 5)

What is the process of collecting and/or analyzing evidence
from computers and other digital storage devices
 
Definition

digital forensics

Term

(Chapter 5)

What is Due Diligence?
 
Definition

The notion that there are customary acts that

parties take for safety and security

 

Parties are less at fault if they show due diligence

in their actions

 
Term

(Chapter 5)

During the aftermath of an incident, you should identify shortcomings in what?
Definition

Risk assessment, policy, or implementation

 
Term

(Chapter 6)

What are the 3 authentication factors?
Definition
  1. Something you know - password or PIN
  2. Something you have - key or token
  3. Something you are - personal trait

 

Term

(Chapter 6)

What is  Cryptographic hash function?
 
Definition

It is a checksum on a message this is either 

– One-way: It should be easy to compute Y=h(M), but hard to find

M given only Y

– Collision-resistant: It should be hard to find two messages, M

and N, such that h(M)=h(N)

 
 
Term

(Chapter 6)

Give examples of two factor authentication. 
Definition

– ATM authentication: ATM card + PIN

– Biometric laptop: Fingerprint + password

– NOT: Password + PIN

 
Term

(Chapter 6)

What are characteristics of a strong password?
Definition

– UPPER/lower case characters

– Special characters

– Numbers

 
Term

(Chapter 6)

List the strengths of the different password complexities. 

Definition
  • Numbers: 1,000,000
  • UPPER or lower case characters: 308,915,776
  • UPPER and lower case characters: 19,770,609,664
  • 32 special characters (&, %, $, £, “, |, ^, §, etc.) = 1,073,741,824
 
Term

(Chapter 6)

Password strength is represented mathematically as AL, What is A and L?
Definition

– A = number of possible characters that can be in the

password

– L = length of the password

 
Term

(Chapter 6)

What is a brute force attack? 
Definition

A password attact that tries every possible character combination

 
Term

(Chapter 6)

 What is a dictionary attack?
Definition

– Uses a list of likely passwords as the password space

– There are far fewer likely passwords than possible

passwords

 
Term

(Chapter 6)

what is password salt? 
Definition

Uses random bits as part of the input to a hash function or encryption algorithm to increase the randomness of the output

 
Term

(Chapter 6)

What the benefits of authentication tokens?

Definition

– Hard to attack - uses a stronger secret than in a typical password

– Hard to forge - must hack the hardware

– Hard to share – secret stored in hardware

 
Term

(Chapter 6)

What the problems of authentication tokens? 
Definition

– Expensive - must buy hardware and/or special authentication software

– Can be lost or stolen

– Risk of hardware failure

 
Term

(Chapter 6)

What is a passive token?
Definition

Stores an unchanging credential

 
Term

(Chapter 6)

What is an active token? 
Definition

Stores a secret that generates a different credential for

each login

 
Term

(Chapter 6)

What is Challenge Response Authentication?
 
Definition

An exchange of data to yield a shared result

 
Term

(Chapter 6)

What are problems with biometric authentication? 
Definition

– Data collection may be intrusive or difficult in some environments

– Privacy issues may exist

– Some changes in characteristics may occur

– Overall, most have an uncomfortable level of false positives and

false negative

 
Term

(Chapter 6)

what is False Acceptance Rate (FAR)?
 
Definition

Likelihood of incorrectly authenticating someone as an

authorized user

 
Term

(Chapter 6)

What is  False Rejection Rate (FRR)?
 
Definition

Likelihood of incorrectly rejecting someone as an

unauthorized user. Can lead to a denial of service

 
Term

(Chapter 6)

 What are some biometric vulnerabilities?
Definition

• Clone or borrow credential – often

– Demonstrated many times with fingerprints, faces, voices, etc.

• Sniff the credential and replay – often

– Possible in networked and remote systems

• Trial and error guessing – slight

– Requires a team of attackers

• Denial of service – possible

• Retrieve from backup – possible

– Attacker intercepts credential pattern database

 
Term

(Chapter 7)

What is encrption?
Definition

a cryptographic technique

 
Term

(Chapter 7)

The encryption procedure (algorithm) takes what 2 inputs?
 
Definition

– Plaintext data

– Encryption key

 
Term

(Chapter 7)

What is substitution cipher?
Definition

text letters of the message remain in the same order, but individual letters are substituted with others according to the key

 
Term

(Chapter 7)

What is symmetric encryption?

 
Definition

sender and recipient must share a secret key

 
Term

(Chapter 7)

What is the Caesar cipher? 

Definition

– Replace each letter in a text by the 3rd letter following it in the alphabet:

– ABCD becomes DEFG; CAT becomes FDW

– Variations rotate by different amounts

 
Term

(Chapter 7)

What is the Vigenere cipher?
Definition

– Uses a series of different rotations

– Uses a block of shift keys, (k1, k2, . . . , kn), to encrypt a plaintext, M, of length n, with each shift key being chosen in order

– There are potentially m different substitutions for any given letter

– Decryption is done by performing reverse shifts

– Can be easily broken using statistical techniques if the

ciphertext is long enough relative to the value of m

 
Term

(Chapter 7)

What is a one time pad?
Definition

– Uses a block of shift keys, (k1, k2, . . . , kn), to encrypt a plaintext, M, of length n, with each shift key being chosen uniformly at random

– The length m of the block of keys must be the same as the length n of the plaintext

– Since each shift is random, every ciphertext is equally likely for any plaintext

 
Term

(Chapter 7)

How is the exclusive or (XOR) used in a binary one time pad?
Definition

– If a and b are different: a ⊕ b = 1

– If a and b are the same: a ⊕ b = 0

– Message M is a binary string of length n
– Pad P is a completely random binary string of length n
– Ciphertext C is produced as C = M ⊕ P
– Completely unbreakable, because each bit of the ciphertext is equally likely to be a 0 or a 
 
Term

(Chapter 7)

What is plaintext?
Definition

readable data

Term

(Chapter 7)

What is cipher text?
Definition

unreadable data

Term

(Chapter 7)

What is a key?
Definition

secret information

Term

(Chapter 7)

what is transposition cipher?
Definition

rearranges the text of the message through a systematic process

 
Term

(Chapter 1)

What are the 6 general types of attacks on information?

Definition
  1. physical theft
  2. denial of service (DOS) - preventing access to a service
  3. subversion - modifying a program to work for an attacker
  4. masquerade - pretend to be an authorized user
  5. disclosure - revealing confidential information
  6. forgery - bogus message sent to a computer
Term

(Chapter 1)

What are the concepts of least privilege?

Definition

• Restrict what people may do to an asset

• Provide the minimum privileges required

• Example: key opens my suite but not yours

Term

(Chapter 1)

What are the concepts of confidentiality?

Definition

– Keeping information secret

– Avoiding disclosure vulnerabilities

Term

(Chapter 1)

What are the concepts of integrity?
Definition

– Protecting information from improper changes

– Avoiding forgery, subversion, and masquerade

attacks

Term

(Chapter 1)

What are the concepts of availability?
Definition

– Keeping systems available and in operation

– Avoiding Denial of Service (DoS) attacks

Term

(Chapter 2)

What are the 4 main strategies to contol access?
Definition
  1. islands
  2. vaults
  3. puzzles
  4. patterns
Term

(Chapter 2)

What is the concept of an island?
Definition

• On an island, we can only touch what is there

– Everything else is brought from elsewhere

• A process can execute its instructions in RAM and 

modify variables in RAM

– It can only use resources brought into its RAM

– It can’t access anything else

• We restrict a process by not allowing it access to 

resources

• This approach is called isolation and mediation

Term

(Chapter 2)

What is the concept of a vault?
Definition

• We can retrieve things from the vault only if allowed

– Someone/something restricts access

– Least Privilege: we only have access to some items

• A bank safe deposit box – we have the key

– The banker lets us retrieve the box

– We can modify the box contents

– We can’t retrieve or modify any other boxes

• Computer access control – a process can retrieve a 

file or print data if granted the right permissions

Term

(Chapter 2)

What is the concept of a puzzle?
Definition

• Protect data by presenting a puzzle

– Authorized users know the puzzle’s answer

• Security Through Obscurity (STO)

– A weak puzzle, like protecting data by hiding it

– Invariably, this approach will fail

• Strong puzzles use Cryptography (“crypto”)

– Mathematical techniques to hide or protect data

– Quality cryptography is very hard to break

• Weak cryptography is simply a form of STO

Term

(Chapter 2)

What is the concept of patterns?
Definition

• Make decisions based on similarities

• Photo IDs – guard compares face against poor photo

– Photos are often laughably inaccurate

• Anti-virus software

– Searches computer for patterns found in viruses

– Must be updated continuously for new viruses

• Biometrics – fingerprint readers, for example

– Compare reading against a stored pattern

• Problems: false positives and false negatives

Term

(Chapter 2)

A software program that exploits a computer vulnerability and copies itself across a network is an example of a/an ___

a. Trojan

b. drive by download

c. virus

d. worm

Definition

d. worm

Term

(Chapter 2)

(True or False)

Steganography is a type of vault computer based access control. 

Definition

False

Steganography is a puzzle

Term

(Chapter 2)

An attack that relies on gaining access to additional areas of memory by providing too much input is know as a/an ___.
a. format string attack
b. arithmetic overflow attack
c. buffer overflow attack
d. shellcode attack
Definition

c. buffer overflow attack

Term

(Chapter 2)

(True or False)
The window of vulnerability is the period of time during which a system is unprotected from an exploit. 
Definition

True

Term

(Chapter 2)

(True or False)
The deny by default approach to file security requires an explicit listing of the users who are allowed to access the file 
Definition

True

Term

(Chapter 2)

Biometrics is an example of using the ___ access control strategy.
a. island
b. pattern
c. vault
d. puzzle
Definition

b. pattern

Term

(Chapter 2)

The type of computer based access control that involves a process that uses secret or hidden information in order to retrieve particular data items is called ___
a. puzzles
b. vaults
c. islands
d. patterns
Definition

puzzle

Term

(Chapter 2)

The Morris worm used a networking service called finger. The purpose of the finger service is to ___
a. report the status of individual computer users
b. determine which operating system is running on a computer
c. report which device drivers a computer uses
d. determine which ports are open on a computer
Definition

a. report the status of individual computer users

Term

(Chapter 2)

a user visits a web page or clicks on a pop up window, which causes malware to be loaded onto the user's system. This is an example of a ___
a. virus infection
b. Trojan infection
c. computer worm attack
d. drive by download 
Definition

d. drive by download 

Term

(Chapter 2)

A zero day exploit
a. refers to an exploit that never occurs
b. does not pose a security threat
c. occurs immediately after a software patch is applied
d. has no software patch 
Definition

d. has no software patch 

Term

(Chapter 4)

When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to ___

a. remove the hard drive

b. transport it while running

c. perform a clean shutdown

d. unplug it

Definition

d. unplug it

Term

(Chapter 4)

When an external attack into a system has occurred and has been detected, what should be done?
a. all of these
b. review risk assessments
c. collect evidence for possible criminal prosecution
d. review security policies
Definition

a. all of these

Term

(Chapter 4)

To produce evidence that will be admissable for a criminal case involving unauthorized computer use, you must ___
a. document everything about the system and its physical condition
b. ensure that nothing has been changed in the system
c. secure the scene by denying access tot he system
d. all of these
Definition

d. all of these

Term

(Chapter 4)

Which of he following statement is correct regarding access rights to files in Windows?
a. if a new file is created, it will only have the access rights explicitly granted to it
b. if a file is copied into a different folder, its original access rights will remain unchanged
c. if a file is moved to a different folder on the same hard drive, it will inherit the access rights of the new parent folder
d. if a file is moved to a different folder, its access righsts remain unchanged
Definition

c. if a file is moved to a different folder on the same hard drive, it will inherit the access rights of the new parent folder

Term

(Chapter 4)

In Windows server domain, which type of permissions are applied first when determining authorization for a file?
a. permissions from folders higher up in the hierarchy
b. deny permissions
c. permissions granting access specifically assigned to the file
d. permissions that are inherited from the parent folder
Definition

b. deny permissions

Term

(Chapter 4)

(True or False)

Event logging is used to improve system security
Definition

?

Term

(Chapter 4)

(True or false)
Windows does not deny an access right by omitting it, but allows you to explicitly deny a right.
Definition

True

Term

(Chapter 4)

(True or False)
When analyzing the contents of a hard drive during a digital investigation, one step you can take to authenticate that you did not change the drive's data is to check the original hard drive for errors.
Definition

False, doing anything to the hard drive may change information

Term

(Chapter 4)

(True or false)
In most operating systems, unauthorized access to files can be detected through event logging
Definition

?

Term

(Chapter 4)

(True or False)
An organization can be considered more at fault if they did not practice due diligence.
Definition

True

Term

(Chapter 4)

The process of recovering a compromised system is called ___
a. restoration
b. sanitation
c. remediation
d. intervention
Definition

c. remediation

Term

(Chapter 6)

What are the 4 token vulnerabilities?

Definition
  1. clone or borrow credential
  2. sniffing and trial and error guessing
  3. denial of service
  4. retreive from backup
Term

(Chapter 6)

What is a one time password token?

Definition

An active token that transmits different credentials based on an internal clock or counter

Term

(Chapter 6)

(True or False)

a dictionary attack on passwords uses every possible character combination

Definition

False, a dictionary attack uses a dicionary of likely passwords (pg 252)

Term

(Chapter 6)

you are using a one way cryptographic hash function to encrypt two messages. In order to be described as ___, the hash function should provide different output for the two messages

a. randomly generating

b. collision resistant

c. collision free

d. unique

Definition

b. collision resistant

Term

(Chapter 6)

(True or False)

when selecting a password, random collections of letters contain far more entropy than English words

Definition

True

Term

(Chapter 6)

an authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of ___

a. mixed mode authentication

b. three factor authentication

c. two factor authentication

d. single factor authentication

Definition

c. two factor authentication (password and fingerprint are two different types of authentication: something you know and something you are)

Term

(Chapter 6)

(True or False)

Challenge response authentication relies on a shared secret

Definition

True, the calculation relies on a shared secret (slide)

Term

(Chapter 6)

(True or False)

a brute force password cracking attempt uses every possible English word as its search space

Definition

False, brute force tries every possible character combination (slides)

Term

(Chapter 6)

When attempting to use a computer system, which occurs first?

a. authorization

b. authentication

c. access control

Definition

b. authentication

Term

(Chapter 6)

attacking the easiest targets is referred to as ___

a. doorknow rattling

b. footprinting the system

c. grabbing the low hanging fruit

d. reducing the search space

Definition

c. grabbing the low hanging fruit (pg 236)

Term

(Chapter 6)

which of the following has the most entropy?

a. random character combinations containing all possible characters

b. random character combinations containing only letters

c. English words

d. Spanish words

Definition

a. random character combinations containing all possible characters

Term

(Chapter 6)

which type of change will improve the strength of a password most significantly?

a. an increase in the set of possible characters that can be used

b. an increase in the length of the password

c. the inclusion of special characters such as %$@!

d. the use of real English words

Definition

b. an increase in the length of the password

Term

(Chapter 6)

in a password system, the total number of possible passwords is called the ___

a. heap size

b. search space

c. complexity strength

d. hash space

Definition

b. search space (pg 247)

Term

(Chapter 6)

(True or False)

A garage door opener transmits the same code each time you use it

Definition

False, a garage door opener uses a hopping or rolling code which creates a pseudo random number (slides)

Term

(Chapter 6)

(True or False)

Entropy refers to the strength of a password system

Definition

False. Entropy refers to the uncertainty in the value of a data item (pg 253)

Term

(Chapter 6)

all of the following are fundamental strategies for authenticating people on computer systems except ___

a. something you are

b. something you make

c. something you know

d. something you possess

Definition

a. Incorrect - something you are (pg 231)

b. Correct - something you make

c. Incorrect - something you know (pg 231)

d. Incorrect - something you possess (pg 231)

Term

(Chapter 6)

(True or False)

When you are biased in selecting a password, you choose your password from the entire search space

Definition

False. When people are biased in their password selection, they choose passwords from only part of the total possible search space. (pg 254)

Term

(Chapter 7) 

Given the following binary values

PLAINTEXT 1011

Key Stream 0110

Using XOR, the resulting ciphertext would be ___

a. 0010

b. 0101

c. 1101

d. 1001

Definition

c. 1101, it produces a '0' when the data match and a '1' when the data differs (pg 300)

Term

(Chapter 7) 

if a cryptoanalyst can select plaintext to be encrypted with the target's secret key, what technique is he using?

a. chosen plaintext

b. known ciphertext

c. known plaintext


Definition

a. chosen plaintext, the analyst can celect plaintext to be encrypted with the target's secret key (pg 295)

Term

(Chapter 7) 

A cipher which retains the original characters of the message but rearranges them is referred to as ___

a. assymetric encryption

b. substituion cipher

c. transposition cipher

d. symmetric encryption

Definition

c. Correct - transposition cipher, we rearrange the text of the message (pg 289)

d. Incorrect - substitution cipher, the text letters remain in the same order, but individual letters are substituted  with others, according to the key (pg 289)

Term

(Chapter 7) 

(True or False)

The Enigma machine was an encryption device used by the US and the UK during World War II

Definition

False, Enigma, a rotor machine used by Germany during World War II (pg 297)

Term

(Chapter 7) 

You are creating an encryption procedure. You replace each letter in a message with a letter that appears 5 places to the left of the original letter. What type of process is this?

a. symmetric encryption

b. Vigenere cipher

c. assymetric encryption

d. substitution cipher

Definition

b. Incorrect (this uses a series of shifts) - Vigenere cipher, uses a series of shifts to encrypt each letter differently. (pg 294)

d. Correct (this uses a shift of 5 places to the left)- substitution cipher, the text letters remain in the same order, but individual letters are substituted  with others, according to the key (pg 289)

Term

(Chapter 7) 

If a cryptoanalyst has only ciphertext to work with, what technique is he using?

a. chosen plaintext

b. known plaintext

c. known ciphertext

Definition

c. known ciphertext. The analyst works exclusively from the ciphertext (pg 295)

Term

(Chapter 7) 

Which type of cipher is unbreakable if not reused?

a. one time pad

b. substititution cipher

c. exclusive or cipher

d. Caesar cipher

Definition

a. one time pad. When properly used, it is mathematically impossible to crack a message encrypted by a one time pad (pg 306)

Term

(Chapter 7) 

(True or False)

The Vigenere cipher uses a series of shifts to encrypt each letter in a message

Definition

True, we use a series of shifts and we encrypt each letter differently with each shift. (pg 294)

Term

(Chapter 7)

(True or False) 

Kerckhoff's principle effectively says that the security of a cryptosystem should depend only on the secrecy of the key.

Definition

True, the secrecy of our plaintext relies entirely on the secrecy of the key (pg 288)

Term

(Chapter 8)

Which of the following statements is correct?

a. When a key is combined with a nonce for the purpose of encrypting a file, only the encrypted nonce is written to the file header

b. When a key is combined with a nonce for the purpose of encrypting a file, the unencrypted nonce is written to the file header along with the encrypted key

c. When a key is combined with a nonce for the purpose of encrypting a file, the nonce is not written to the file header

d. When a key is combined with a nonce for the purpose of encrypting a file, the encrypted nonce is written to the file header along with the encrypted key

 

Definition

b. When a key is combined with a nonce for the purpose of encrypting a file, the unencrypted nonce is written to the file header along with the encrypted key (pg 337)

Term

(Chapter 8)

(True or False)
An attacker performing a man in the middle attack can easily break a public private key pair by intercepting encrypted messages
Definition

True, also known as a bucket brigade attack. A forgery can be distributed. The file claims to contain the True public key but in fact it contains the Attacker's public key (pg 369)

Term

(Chapter 8)

a public key certificate generally does not contain ___

a. a private key

b. the name of the public key's owner

c. a public key

d. a digital signature that covers the name and the public key

 
 
Definition

a. Correct - a private key

b. Incorrect - the name of the public key's owner

c. Incorrect - a public key

d. Incorrect - a digital signature that covers the name and the public key

Term

(Chapter 8)

Which of the following statements about key wrapping is correct?

a. The CEK is used to encrypt the KEK

b. The KEK is produced by hashing the CEK combined with a nonce

c. The KEK is used to encrypt the data in the file

d. The KEK is used to encrypt the CEK

 
 
Definition

d. The KEK is used to encrypt the CEK, the program wraps the CEK by encrypting it with the KEK (pg 339)

Term

(Chapter 8)

(True or False)
A digital certificate is created using the public key of the certificate authority
 
Definition

True, to construct a certificate, we calculate the hash over the owner's name and public key, then we use a private key to construct the signature. (pg 370 & slides)

Term

(Chapter 8)

If a cryptograhic hash function produces the same output from two different inputs, it is considered to ___
a. have high entropy
b. have weak collision resistance
c. have high compression
d. have a highly random initialization vector
 
Definition

b. have weak collision resistance

Term

(Chapter 8)

(True or False)
A nonce is a secret key
 
Definition

False

Term

(Chapter 8)

 (True or False)
if an encrypted file is to be shared with multiple recipients, each of whom has his own passphrase, the file must contain one KEK and multiple CEKs
 
Definition

False, shares the same CEK among everyone, but wrap the CEK separately with each passphrase (KEK)

Term

(Chapter 8)

 Alice and Bob are using the Diffie-Hellman protocol to exchange keys. Which of the following statements about this process is correct?
a. Bob computes his secret key using the generator and sends his key to Alice
b. Both alice and Bob use the same prime number and generator
c. Alice picks a random number to use and sends that number to Bob.
d. Alice uses Bob's secret key to compute her secret key
 
Definition

?

Term

(Chapter 8)

 (True or False)
A digital signature uses symmetric keys to sign or verify digital data
 
Definition

False, the asymmetry in public key cryptography allows us to produce digital signatues (pg 345)

Term

(Chapter 8)

 (True or False)
Key wrapping involves encrypting a key with a nonce
 
Definition

False, we encrypt the key itself using the passphrase (pg 338)

Term

(Chapter 8)

 (True or False)
a digital signature is produced by using the sender's private key to encrypt a message or a digest of the message
 
Definition

True, Alice uses her private key to produce a digital signature (slides)

Term

(Chapter 8)

The property of ___ on a digital signature scheme indicates that it is difficult for an attacker to use an existing signature on a different message.

a. nonrepudiation

b. nonmutability

c. nonrevocation

d. nonforgeability

 
 
Definition

a. Incorrect - nonrepudiation - proof that the key's owner signed the digital data

b. Correct - nonmutability - difficult for an attacker to convert an existing signature into a valid signature on a different message

c. Incorrect

d. Incorrect- Nonforgeability - difficult for an attacker to forge a signature

 

Term

(Chapter 8)

(True or False)

Diffie Hellman protocol is used to encrypt messages
 
Definition

False, it is used for key exchange

Term

(Chapter 8)

Which of the following statements is correct?
a. AES is a cryptographic compression function
b. DES is a cryptographic compression function
c. SHA-256 is a cryptographic compression function
d. RSA is a cryptographic compression function
 
Definition

c. SHA-256 is a cryptographic compression function, SHA-256 uses a compression function with inputs of m=512 bits and n = 256 bits, and produces hash values of n = 256 bits (slides)

Supporting users have an ad free experience!