COMPSCI 455 Flashcards

(17 cards)

1
Q

True or False, The public key in any public key cryptosystem is always used for encryption, and private key for decryption

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what scenario is private key cryptography preferred over public key?

A

Bulk data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In what scenario is public key cryptography preferred over private key?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What scenario is public and private key cryptography used in tandem?

A

Public key to exchange a session key and a private session key for bulk data en/decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user of direct digital signature could claim that their private key was stolen and used to sign fraudulent messages. How do we prevent this ploy?

A

Include a timestamp with each digital signature and enforce a policy of frequent key changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are X.509 certificates preferred over a PKA?

A

Users can authenticate one another using certificates without lengthy transactions with a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who can verify the integrity of an X.509 certificate?

A

Anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who can create an X.509 certificate?

A

Anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who can sign a X.509 certificate?

A

Only the certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Kerberos verify the identity of the workstation user?

A

The authentication server encrypts the ticket using a key derived from the user’s workstation password so only the corresponding user would be able to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 5 things that the client receives from the authentication server?

A
  1. A timestamp
  2. The identity of the client
  3. A key for the client to use when communicating with the ticket-granting server
  4. The identity of the ticket-granting server
  5. A service-granting ticket
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between connecting and binding to an endpoint?

A

Client sockets connect to an endpoint, server sockets bind to an endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who provides the attributes of principles in FIM?

A

Principles and Administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A PIV smart card has three types of memory, they are ___, ___, and ___

A

ROM
EEPROM
RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of building SSL into modern web browsers and other everyday web applications?

A

Provide built-in security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL is deployed above the ___ layer and below the ___ layer on the network stack

A

Transport
Application

17
Q

What are the SSH authentication methods?

A

Public key
Password
Host based