Final Flashcards

1
Q

Three Modes/Use Cases for VPN

A

host to host, host to LAN, LAN to LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VLAN

A

virtual local area network, virtually isolated networks from each other in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

three kinds of ciphers in cryptogtaphy

A

symmetric, public-key, one-way hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPN: full tunnels vs. split tunnels

A

full tunnel encrypts all traffic, split tunnels only select traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

proxy

A

a gateway/sever between the internet and users that processes your traffic and gives response back to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does cryptography do/help with?

A

data protection, authentication, digital signature, data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

public-key ciphers

A

two keys (public and private) undo whatever the other key did and vice versa (reversible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

symmetric-key cipher

A

secret codeword/key both locks and unlocks data which is being protected (reversible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

one-way hash / message digest

A

mapping functions from large set to a smaller set, collisions inevitable, but not predictable, it is irreversible…ex: SHA256, MD5(not used), SHA1(not used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

block cipher vs stream cipher

A

block cipher from plain text to fixed size, stream encrypts one bit at a time (variable length)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DMZ

A

Demilitarized Zone, is like a buffer zone between a private/internal network and the outside world, typically the internet. It’s designed to provide an extra layer of security for sensitive systems within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ways to break crypto

A

brute force, implementation mistakes, knowing some of the message, denial of service, social engineering( rubber-hose cryptography)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cryptography authentication

A

can use certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

midterm: 3 ways to authenticate

A

something you know(passwords, personal IDs) , are(fingerprint, iris), have(phone, email)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how do cryptosystems work to do message encryption

A

they take a low entropy text and turn it into a high entropy ciphertext which is mathematically indistinguishable from random data, in public keys, encrypt message using recivers public key, and decrypt with recievers private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

digital signature

A

verifies authenticity (that the sender actually sent it), encrypt with private key, and decrypt with public key

17
Q

trusted computing

A

belief computers will operate in a predictable manner with authenticated and protected data