Application Flashcards

1
Q

SMTP (Simple Mail Transfer Protocol)

A

used for fowarding email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

POP (Post OFfice Protocol)

A

contacting your email service and downloading all of your new messages from it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IMAP (Internet Message Access Protocol)

A

allows you to access your email wherever you are, from any device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process of One to Multiple Email

A

message generates a symmetric key and encrypts with all recipients public keys

when received the recipients extract the symmetric key and decrypt the message with symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process of One to One Email

A

Sender sends email to local MTA

MTA forwards email to another MTA

Receiver receives email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Process of One to Distribution List Email

A

Exploder Server has public-private keys for every list

symmetric key is generated and email encrypted with exploder server public key

Email sent to Exploder server

Exploder decrypts using private key and obtains symmetric key

Exploder encrypts symmetric key with members public key

Exploder forwards message and symmetric key to recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric Cryptosystem

A
Plaintext -> 
Recipient's public key (Encryption) -> 
Ciphertext -> 
Recipient's Private Key (Decryption) -> 
Original Plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Cryptosystem

A

□ Plaintext ->
Encryption key -> Ciphertext ->
Decryption key -> Original Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Signature

A

technique used to validate authenticity and integrity of message/digital doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Certificate

A

electronic document that binds together a public-key with an identity and can be used to verify that a public key belongs to a particular person or entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Certificate process

A

Bob sends his public key to Vera (Certificate Signing Request) (.csr)

Vera verifies that Bob “is who he says he is”

Vera “digitally signs” and returns it to Bob (SSL/TLS Certificate) (.crt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PGP (Pretty Good Privacy)

A

De-facto standard email encryption scheme for providing security services for email communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which of CIA does PGP have

A

Confidentiality and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security mechanism and components of PGP?

A

Hashing, Encryption, Compression, Formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

S/MIME

A

secure email standard

good option for security of non text content

centralized authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly