Shared Flashcard Set

Details

Comptia Network+ Chapter 10: Securing TCP/IP
Studying material based on Mike Meyers' book
10
Computer Networking
Post-Graduate
03/11/2024

Additional Computer Networking Flashcards

 


 

Cards

Term

The process of scrambling, mixing up or changing data in a way that makes it unreadable to anyone but the owner or intended recipient. (pg. 354)

 

A. Authentication

B. Nonrepudiation

C. Encryption

D. Ciphering

Definition

C. The encrypted data is scrambled and unscrambled with cryptographic keys.

 

Authentication verifies that the right person is accessing the data.

 

Nonrepudiation traces actions back to specific users.

 

A cipher is a way to encrypt data, but not necessarily the process.

Term

The process that guarantees that the data received is the same as originally sent. (pg. 354)

 

A. Encryption

B. Authentication

C. Algorithm

D. Integrity

Definition

D. Integrity is designed to cover situations in which someone intercepts your data on-the-fly and makes changes.

 

Encryption makes data unreadable to unintended viewers.

 

An algorithm is the mathematical formula that underlies the cipher.

Term

Not being able to deny having taken a specific action. (pg. 354)

 

A. Event tracking

B. Integrity

C. Activity monitoring

D. Nonrepudiation

Definition

D. Non repudiation

 

 Integrity guarantees that the data received is the same as originally sent.

 

Event tracking and activity monitoring are concepts that exist, but weren't the specific terms that applied.

Term

When it comes to TCP/IP security, ___ combine encryption, integrity, non-repudiation, authentication and authorization to create complete security solutions in a way that makes sense for their specific purpose. (pg. 354)

 

A. Anti-malware applications

B. Protocols

C. Security suites

D. Policies

Definition

B. Protocols

 

Anti-malware apps and security suites may have features to help secure TCP/IP but are usually designed for an entire OS.

 

Policies is almost a synonym for protocols, but the latter is the more commonly used term.

Term

What is the difference between cleartext, plaintext and ciphertext? (pg. 355)

 

Definition
Cleartext is data that hasn't yet been encrypted. Plaintext is any data that passes through a cipher, even if it has already been encrypted. Running it through a cipher algorithm using a key generates the encrypted ciphertext.
Term

Any encryption that uses the same key for both encryption and decryption is called ___ encryption. Any encryption that uses different keys for encryption and decryption is called ____ encryption. (pg. 358)

 

A. uniform, diverse

B. symmetric, asymmetric

C. unicode, multicode

D. static, dynamic

Definition
B. Symmetric and asymmetric encryption
Term

A method of cryptography that uses two different keys. (pg. 359)

 

A. stream cipher

B. checksum

C. AES

D. public-key

Definition

D. Public-key cryptography uses a public-key for encryption and a private key for decryption. This key pair is generated at the same time and is designed to work together.

 

Stream cipher and AES (Advanced Encryption Standard) are both symmetric-key encryption methods.

 

A checksum is an error-detection method that enables the receiver to detect the corruption of network packets.

Term

A mathematical function ran on a string of binary digits of any length that results in a value of some fixed length. (pg. 361)

 

A. message digest

B. stream cipher

C. hash

D. checksum

Definition

C. A cryptographic hash function will always be the same length no matter how long or short the input and is a irreversible, meaning the original data from the hash can't be recreated.

 

A message digest and checksum are the same thing: the fixed-length value created from the hash after its run.

 

A stream cipher is a form of symmetric encryption in which each bit is encrypted one at a time on the fly.

Term

A digitally signed electronic document issued by a trusted third party attesting to the identity of the holder of a specific cryptographic public key. (pg. 366)

 

A. Key Distribution Center

B. certificate

C. digital signature

D. Access Control List

Definition

B. A certificate includes a public key, some info about the file, and the digital signature of the trusted third party.

 

The other options are either a system in Kerberos (Key Distribution Center), secure part of message (digital signature) or list (Access Control List). Their names hint that they aren't documents.

Term

The system for creating and distributing digital certificates issued by trusted third parties such as Let's Encrypt, Go Daddy, or Sectigo. (pg. 370)

 

A. digital authority

B. DigiCert

C. public-key authority

D. certificate authority

Definition

C.  A public-key authority is a hierarchy that consists of a root certificate authority (CA), with intermediate CAs between the root and the issued certificates.

 

DigiCert is a well-known CA that can act as the root and issue certificates.

Supporting users have an ad free experience!