Chapter 10 - Securing TCP/IP Flashcards
Any encryption that uses the same key for encryption and decryption is called a ______.
Symetric key.
RC4 is a _____ cipher.
Stream.
In a PKI method, which key encrypt the data?
The public key.
The process of verifying with a high degree of certitude that the sender is who the receiver thinks he or she would be.
Nonrepudiation.
A hash function is by definition a _______.
one-way function.
In order to have a PKI you must have a ______.
Root authority.
Which type of access contol requires a label to define its sensitivity? MAC, DAC or RBAC.
MAC.
If you saw traffic runinng on UDP port 1812 and 1813, what AAAA standard would you know was running?
RADIUS.
Which authentication standard is highly time sensitive?
Kerberos.
What are the 5 area of security?
Encryption, integrity, nonrepudiation, authentication, authorization.
Name some symetric block cypher.
AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES, Blowfish, IDEA (Internation Data Encryption Algorithm).
Name a stream cipher.
RC4 (Rivest Cipher 4).
Name some hash funtions.
MDA5 (Message Digest Algorythm), SHA-1 (Secure Hash Algorythm), SHA-2, SHA-3.
What is a digital signature?
A hash of the public key encrypted by the private key.
What is a PKI?
A PKI is a Public Key Infrastructure. When you try to connect to a service, it sends you a digital certificate (that contains the digital signature of the CA and the public key of the server). You verify this certificate with the root and process with the connection.