Shared Flashcard Set

Details

Exam 4
exam 4 info sec
42
Computer Networking
Undergraduate 4
11/22/2016

Additional Computer Networking Flashcards

 


 

Cards

Term

Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:

 

 

Personal digital

 

Public digital

 

Private digital

 

Server digital

Definition

Server digital

 
Term

Which of the following key exchanges uses the same keys each time?

 

 

Diffie-Hellman Ephemeral (DHE)

 

Diffie-Hellman (DH)

 

Diffie-Hellman-RSA (DHRSA)

 

Elliptic Curve Diffie-Hellman (ECDH)

Definition
Diffie-Hellman (DH)
Term

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

 

 

Shift

 

Substitution

 

lock

 

Loop

Definition
Substitution
Term

When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?

 

 

web of

 

mutual

 

third-party

 

distributed

Definition

third-party

 
Term

What type of certificate is typically used by an individual to secure e-mail transmissions?

 

 

Private digital

 

Personal digital

 

Public digital

 

Server digital

Definition

Personal digital

 
Term

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

 

 

Substitution

 

Block

 

Loop

 

Sponge

Definition

 

Sponge

Term

Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

 

 

Registration Authority

 

Delegation Authority

 

Certification Authority

 

Participation Authority

Definition
 

Certification Authority

 
Term

The Hashed Message Authentication Code (HMAC)

 

 

encrypts only the key

 

encrypts the key and the message

 

encrypts only the message

 

encryps the DHE key only

Definition

encrypts the key and the message

 
Term

Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.

 

 

 

Definition
true
Term
The original cryptographic algorithms for encrypting and decrypting documents are _________________ cryptographic algorithms.
Definition
symmetric
Term
The Data Encryption Standard is a(n) ______________ cipher.
Definition
block
Term

Elliptic Curve Diffie-Hellman (ECDH) is an example of

 

 

in-band key exchange

 

out-of-band key exchange

 

SHA-1 key management

 

AES key certification

Definition
in-band key exchange
Term

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

 

 

RSA

 

SHA 1

 

MD5

 

MD2

Definition
MD2
Term

What is the name of the cryptographic hash function that creates a digest of 512 bits, will not be subject to patents, has international recognition and has been adopted by standards organizations such as the ISO?

 

 

Twofish

 

Blowfish

 

Whirlpool

 

Rijndal

Definition
Whirlpool
Term

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

 

 

bridge trust

 

distributed trust

 

third-party trust

 

transitive trust

Definition
bridge trust
Term

Which protection is provided by hashing?

 

 

Authentication

 

Confidentiality

 

Integrity

 

Availability

Definition
Integrity
Term

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

 

a.

FCC

b.

RSA

c.

ECC

d.

IKE

Definition
ECC
Term

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

 

 

96 bits

 

128 bits

 

160 bits

 

192 bits

Definition
160 bits
Term

Which of the following would you use in order to ensure a secure cryptographic connection between a web browser and a web server?

 

 

Web digital certificate

 

Email web certificate

 

Server digital certificate

 

Personal digital certificate

Definition
 

Server digital certificate

 
Term

Public keys can be stored by embedding them within digital certificates, while private keys should be stored on the user’s local system.

 

 

 

Definition
True
Term
A(n) _______________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.
Definition
hierarchical
Term
_________________ may be defined as confidence in or reliance on another person or entity.
Definition
Trust
Term

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

 

 

RSA

 

AES

 

Blowfish

 

3DES

Definition
blowfish
Term

If using the MD5 hashing algorithm, what is the length to which each message is padded?

 

 

32 bits

 

64 bits

 

128 bits

 

512 bits

Definition
512 bits
Term

Digital signatures only show that the public key of the sender was used to encrypt the digital signature.

 

 

 

Definition
False
Term
In information technology, ____________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
Definition
non-repudiation
Term

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?

 

 

TLS 3.0

 

IPSec

 

GPG

 

SSL

Definition
IPsec
Term

The latest version of the Secure Hash Algorithm is

 

 

SHA-2

 

SHA-3

 

SHA-4

 

SHA-5

Definition
SHA-3
Term

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

 

 

Matrix-based

 

Lattice-based

 

Linear

 

Quantum

Definition
Lattice-based
Term

The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.

 

 

 

Definition
True
Term

 

Key ______________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.

Definition
expiration
Term

Which protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?

 

 

SSL

 

TLS

 

PEAP

 

EAP

Definition
SSL
Term

Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?

 

 

third-party trust

 

related trust

 

managed trust

 

distributed trust

Definition
distributed trust
Term

What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX and Linux systems and is compatible with PGP?

 

 

GPG

 

OGP

 

CGP

 

GPP

Definition
GPG
Term

A sensitive connection between a client and a web server uses what class of certificate?

 

 

Class 1

 

Class 2

 

Class 3

 

Class 4

Definition
Class 2
Term

A key that is generated by a symmetric cryptographic algorithm is said to be a:

 

 

Private key

 

Public Key

 

Symmetric key

 

Shared key

Definition
Private key
Term

Which of the following is used to enforce non-repudiation of an e-mail message?

 

 

Symmetric encryption

 

Private encryption

 

Asymmetric encryption

 

Elliptic encryption

Definition
Asymmetric encryption
Term

The asymmetric cryptography algorithm most commonly used is:

 

a.

AES

b.

RSA

c.

Twofish

d.

Blowfish

Definition
RSA
Term
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.
Definition
one-time pad
Term

Self-encrypting HDDs are commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial and medical environments.

 

 

 

Definition
True
Term

A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.

 

 

 

Definition
False
Term

Public key infrastructure (PKI) ____________.

 

 

creates private key cryptography

 

is the management of digital certificates

 

requires the use of an RA instead of a CA

 

generates public/private keys automatically

Definition
is the management of digital certificates
Supporting users have an ad free experience!