Chapter 4 Flashcards

Combo: Quiz 4 plus Book End of Chapter Questions

1
Q

Which of the following is NOT a method for strengthening a key?

a. Randomness
b. Cryptoperiod
c. Length
d. Variability

A

d. Variability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following clock ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

a. Electronic Code Book (ECB)
b. Galois/Counter (GCM)
c. Counter (CTR)
d. Cipher Block Chaining (CBC)

A

d. Cipher Block Chaining (CBC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What entity calls in crypto modules to perform cryptographic tasks?

a. Certificate Authority (CA)
b. OCSP Chain
c. Intermediate CA
d. Cypto service provider

A

d. Cypto service providerd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

a. Encrypted signatures
b. Session keys
c. Digital certificates
d. Digital digests

A

b. Session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is considered the strongest cryptographic transport protocol?

a. TLS v1.2
b. TLS v1.0
c. SSL v2.0
d. SSL v2.0

A

a. TLS v1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The strongest technology that would assure Alice that Bob is the sender of the message is a(n) __________.

a. digital signature
b. encrypted signature
c. digest
d. digest certificate

A

a. digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A digital certificate associates __________.

a. a user’s public key with his private key
b. the user’s identity with his public key
c. a user’s private key with the public key
d. a private key with a digital signature

A

b. the user’s identity with his public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital certificates can be used for each of these EXCEPT __________.

a. to verify the authenticity of the Registration Authorizer.
b. to encrypt channels to provide secure communication between clients and servers
c. to verify the identity of clients and servers on the Web
d. to encrypt messages for secure email communication

A

a. to verify the authenticity of the Registration Authorizer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An entity that issues digital certificates is a __________.

a. certificate signatory (CS)
b. digital signer (DN)
c. certificate authority (CA)
d. signature authority (SA)

A

c. certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A centralized directory of digital certificates is called a(n) ___________.

a. Digital Signature Permitted Authorization (DSPA)
b. Digital Signature Approval List (DSAP)
c. Certificate Repository (CR)
d. Authorized Digital Signature (ADS)

A

c. Certificate Repository (CR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________ performs a real-time lookup of a digital certificate’s status.

a. Certificate Revocation List (CRL)
b. Real-Time CA Verification (RTCAV)
c. Online Certificate Status Protocol (OCSP)
d. CA Registry Database (CARD)

A

c. Online Certificate Status Protocol (OCSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ is a protocol for securely accessing a remote computer.

a. Transport Layer Security (TLS)
b. Secure Shell (SSH)
c. Secure Sockets layer (SSL)
d. Secure Hypertext Transport Protocol (SHTTP)

A

b. Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

a. Algorithm
b. Initialization vector (IV)
c. Nonce
d. Salt

A

d. Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which digital certificate displays the name of the entity behind the website?

a. Online Certificate Status Certificate
b. Extended Validation (EV) Certificate
c. Session Certificate
d. X.509 Certificate

A

b. Extended Validation (EV) Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which trust model has multiple CAs, one of which acts as a facilitator?

a. Bridge
b. Hierarchical
c. Distributed
d. Web

A

a. Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement is NOT true regarding hierarchical trust models?

a. It is designed for use on a large scale.
b. The root signals all digital certificate authorities with a signal key.
c. It assigns a single hierarchy with one master CA.
d. The master CA is called the root.

A

a. It is designed for use on a large scale.

17
Q

Public key infrastructure (PKI) __________.

a. generates public/private keys automatically
b. creates private key cryptography
c. is the management of digital certificates
d. requires the use of an RA instead of a CA

A

c. is the management of digital certificates

18
Q

A(n) __________ is a published set of rules that govern the operation pf a PKI.

a. signature resource guide (SRG)
b. enforcement certificate (EF)
c. certificate practice statement (CPS)
d. certificate policy (CP)

A

d. certificate policy (CP)

19
Q

Which of these is NOT part of the certificate life cycle?

a. WXpiration
b. Revocation
c. Authorization
d. Creation

A

c. Authorization

20
Q

__________ refers to a situation in which keys are managed by a third party, such as a trusted CA.

a. Key authorization
b. Key escrow
c. Remote key administration
d. Trusted key authority

A

b. Key escrow

21
Q

What are three areas of protection provided by IPSEC?

A

1) authentication
2) confidentiality
3) key management

22
Q

When two individuals trust each other because of the trust that exists between the indviduals and a separate entity, what type of trust has been established?

a) third-party
b) distributed
c) mutual
d) web of

A

a) third-party

23
Q

What is used to create session keys?

a) master secret
b) validation
c) crypto modules
d) domain validation

A

a) master secret

24
Q

Stream cipers work on multiple characters at a time.

(T/F)

A

False

25
Q

What tyep of trust model is used as the basis for most digital certificates used ont eh internet?

a) managed trust
b) related trust
c) thrid-party trust
d) distributed trust

A

d) distributed trust

26
Q

What common method is used to ensure the security and integrity of a root CA?

a) keep in in an online state and encrypt it
b) keep it in an offline state from the network
c) password protect the root CA
d) only use the root CA infrequently

A

b) keep it in an offline state from the network

27
Q

A framework for all of teh entites involved in digital certifctes for digital certifcate management is known as:

a) network key infrastructure
b) shared key infrastructure
c) private key infrasstructure
d) public key infrastructure

A

d) public key infrastructure

28
Q

What is S/MIME protocol used for?

A

Securing email messages

29
Q

A certificate repository (CR) is a publicly accessible centralized directory of digital certificates.

(T/F)

A

True