Architecture and Design Flashcards
What are the three issues that symmetric data encryption fails to address?
- Digital integrity
- Repudiation
- Scalable Key Distribution
Which encryption method is more scalable?
Asymmetric encryption
What is the key length used by a one-time pad?
- The key length is the same length as the message that is to be encrypted
- The message length determines the key length
Which term refers to the assurance that data has not been altered in transmission?
Data integrity
What is the size, in bits, of a Message Digest version 5 (MD5) hash?
128 bits
What is meant by the term VM escape?
An exploit in which the attacker runs code on a VM that allows an OS running within it to break out and interact directly with the hypervisor
What key is used to decrypt a digital signature: public or private
Public
What does the acronym MFD denote?
Multi-functional device
Which private-key encryption algorithm does Pretty Good Privacy (PGP) use to encrypt data?
International Data Encryption Algorithm (IDEA)
Why should you periodically test an alternate site?
To ensure continued compatibility and recovery
What bit length is the hash value provided by the Secure Hash Algorithm (SHA)
160 bits
What is the name of the array where hashed items are kept?
Hash table
What is the process by which a system determines that a specific user is authorized to perform certain functions?
Authorization
What is the purpose of a file’s MD5 hash value?
To verify file integrity
Which servers are susceptible to the same type of attacks as their host, including DoS attacks, detection attacks, and escape attacks?
Virtual servers
What is the purpose of a Message Authentication Code (MAC)
Message Authentication Code (MAC) helps protect against fraud in electronic fund transfers
What does the acronym IoT denote
Internet of Things
What is meant by the term transitive trust?
A two-way relationship created between parent and child domains
What is the purpose of DLP?
Data Loss Prevention (DLP) is a network system that monitors data on computers to ensure the data is not deleted or removed
What does the acronym UAV denote?
Unmanned Aerial Vehicle
Which fire suppression method, formally used to suppress fires involving electrical equipment or liquids, has been discontinued?
Halon gas
What is a pass-the-hash attack?
When an attacker obtains a hashed user credential and uses it to authenticate to a system without cracking it
Is the Data Encryption Standard (DES) algorithm asymmetric or symmetric?
Symmetric
Which alternate computing facility takes the least amount of time to become operational?
Hot site