don't use Flashcards

(137 cards)

1
Q

Digital signature require what?

A

Public Key infrastructures (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

X.509 V.4 is for what?

A

Certificate Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

A

Hashed Message Authentication Code (no PKI Used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates are Digitally signed by who?

A

(CA) Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The steps in a SSL / TLS connection?

A
  1. The client makes a SSL Session
  2. The Server provides its Certificate with its public key
  3. the client encrypts with the servers public key
  4. the server decrypts wit it’s private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main Hashing Algorithms and bit size

A
  1. MD-5 128 bits
  2. SHA-1 160 Bits
  3. SHA-256 256 Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OCSP ?

A

Online Certificate Status Protocol

( Certificate Revocation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to tell if a Certificate has been Revoke

A
  1. Online Certificate Status Protocol (OCSP)

2. CRL (downloadable list from CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two Documents produce the same Hashed # ?

A

A collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An Attempt to Cause Collisions

A

Birthday Attacks (Hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificates help to prevent what ?

A

Man in the middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric Stream Crypto

A

RC-4 Used on WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 parts of the Public Key infrastructures (PKI)

A
  1. (CA) Certificate Authority
  2. (RA) Registration Authority
  3. Certificate Repository
  4. Certificate Revocation list
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Very Efficient Crypto?

A

ECC Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what Cryptography is used on Low CPU powered devices?

A

ECC Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Key-Agreement Without Pre-shared Secrets

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

First Asymmetric Algorithm

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Use Factorization

A

RSA use a Trap-Door function for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Digital signature use what Algorithm

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 6 Asymmetric Algorithm

A
  1. RSA
  2. DSA
  3. ECC = Elliptical Curve Cryptography
  4. El Gamall
  5. DH = Diffie Hellman
  6. Knapsack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bulk Encryption use What Cryptography Type?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cryptography used for Key Encryption and distribution

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric Algorithm Key Formula

A

2N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Symmetric Algorithm Key Formula

A

N=(N-1) /2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SSL / TLS use what for Key Exchange
Asymmetric Algorithm
26
SSL / TLS use what for Data Exchange
Symmetric Algorithm
27
In Asymmetric How do we get Authenticity?
Senders Private Key
28
In Asymmetric How do we get Non-Repudiation?
Hash Encrypted by Senders Private Key
29
In Asymmetric How do we get Privacy?
Receivers's Public Key
30
What is a Digital signature made with?
A hash with the Sender's Private Key
31
A Private Key Crypto?
Asymmetric
32
IDEA
Used by PGP An Symmetric Algorithm & Block Algorithm
33
3DES Algorithm type? Block or stream? # of rounds?
Symmetric Algorithm Block Algorithm 48 Rounds
34
3DES was replaced by?
AES
35
BlowFish Algorithm type? Block or stream and size? # of rounds?
Symmetric Algorithm Block Algorithm 64-bit block size 48 Rounds
36
BlowFish Algorithm type? Block or stream and size? # of rounds?
Symmetric Algorithm Stream Algorithm no rounds
37
Symmetric Algorithm only gives you what?
Privately
38
Stream Ciphers use What?
XOR
39
XOR
if values are: A like = 0 value Different = 1 value
40
Block Crypto have to be what type of Algorithm ?
Symmetric Algorithm
41
Symmetric Block Algorithms are?
1. AES - Standard 2. 3DES - More cpu intenced (slower) 3. P2P - IDEA used in mail
42
the slower Algorithm is?
Asymmetric
43
Other names for Symmetric Algorithm?
1. Private Key 2. Secret Keys 3. Share Keys 4. Session Keys
44
Shared Key Crypto?
Symmetric Algorithm
45
Kerchoff's Principle Means?
Keep the Key Secret, The algorithm is Publicly known. ** Openness **
46
What is Diffusion in Block cipher ?
Transposition | *** Plain Text is Added with the Cipher text
47
What is Confusion in Block cipher ?
Relates to Subtitution | ** Good Strong Math)
48
Diffusion and Confusion is used in what?
Symmetric Algorithm Block cipher
49
Two Primary Attributes To Symmetric Algorithm Block cipher?
Diffusion and Confusion
50
Another way to say Cipher?
Algorithm
51
The 5 Desirable qualities of an Algorithm
1. Diffusion 2. Confusion 3. Avalanche = A charter change Cascades through the text 4. Permutations = Rounds 5. openess = Kerchoff's Principle
52
Algorithm rounds are also called ?
Permutations
53
Sue-do Randam Numbers is also called?
Initialization Vector
54
Security Services provided by Cryptography?
``` P = Privacy A= Authenticity I = Integrity N= Non-Repubiation ```
55
Authenticity does what?
Verifies the Claimed Identity
56
The 4 Requirements for Vernam Cipher (one Time Pad)
1. The Key must be used only once. 2. The Pad Must be al least as long as the Message 3. Key Pad is Statistically Unpredictable 4. The key Pad must be delivered and stored securely.
57
The only unbreakable Mathematically cryptography is?
Vernam Cipher (One Time Pad)
58
The Cipher that the first letter of the key is matched up against the first letter of the message?
Polyalphabetic Cipher | VIGNERE
59
First Polyalphabetic Cipher ?
VIGNERE
60
A cipher that was wrapped rounded a rod?
``` Scytale The size (diameter) of the rod was the secret key ```
61
A cipher that are subject to pattern analysis
Substitution Ciphers | Caesar Cipher
62
Caesar Cipher was what type of Cipher?
``` Substitution Cipher shift characters (3) spaces ```
63
The Security Model That Protects Integrity?
BIBA Model and Clark-Wilson
64
The Security Model That enforces well-formed transactions?
Clark-Wilson
65
Clark-Wilson uses what for Separation of duties?
API's
66
The Main stream Security Mode is ?
Clark-Wilson | NON-DOD
67
the Down Data's Dirty is what Security Mode?
BIBA Model
68
* Integrity Axiom means what?
NO Write UP | BIBA Model
69
The Processor Functions in What Ring?
Ring 3
70
What Ring is the User Mode in?
Ring 3
71
What Ring is the Privileged Mode in?
Ring 0
72
The 5 types of CPU executions?
1. Multi programming (windows 3.1) 2. Multitasking 3. Multitheading 4. Multiprocessing 5. Multi-core processors
73
The Two types of Multitasking?
Cooperative | Preemptive
74
Cooperative Multitasking does not do what?
no isolation of the individual processes
75
Very high speed memory used for storage by the CPU is called?
Registers
76
Execution or CPU Cycle is when?
The Control Unit and ALU performs the mathematical or logical operations on the DATA
77
Used by the Processor to keep track of which instruction code have been processed and what ones will be processed next
Instruction Pointer
78
CPU Fetch?
When the Control unit gets the instructions from the System Memory.
79
The 4 CPU cycles?
1. Fetch 2. Decode 3. Execute 4. Store
80
TCB ?
Trusted Computer Base | It secures the cpu, memory, OS Kernel and Firmware.
81
It Delineates the trusted and untrusted components within a computer system
Security Perimeter | *** It Isolates the TCB
82
Isolates the Trusted Computer Base (TCB)?
Security Perimeter
83
Security Kernel
The Enforcer | Enforces the Reference Monitor Concept
84
performs the mathematical or logical operations on the DATA it gets from memory
ALU
85
What are the 3 Elements of the Trusted Computer Base (TCB)
1. Security Perimeter 2. Reference Monitor 3. Security Kernel
86
Is an Abstract Machine concept that mediate ALL access between SUBJECTS and OBJECTS
Reference Monitor | THE Rules
87
Windows 10 Falls under what TCSEC Level
C
88
the operation Mode that use a Reference Monitor to control Access?
Multilevel
89
Operation Mode that enforces an AIRGAP
Dedicated
90
Which Security Feature prevents an Covert Channel?
NON Interference
91
Called the Orange Book
TCSEC | Trusted Computer System Evaluation Criteria
92
TCSEC
Trusted Computer System Evaluation Criteria
93
NO Read Down and No Write UP, is what Security Model?
BIBA Model
94
What Model uses ALPHA, BETA GAMMA
The Lattice-Based Access Controls
95
What security model does not prevent unauthorized alterations of High-Level Data?
Bell-Lapadula Model
96
NO READ UP and NO Write DOWN is what Security Model?
Bell-Lapadula Model
97
what Security Model protects Confidentialy?
Bell-Lapadula Model
98
Simple Security Property is ?
NO READ UP
99
* Security Property is ?
NO WRITE Down
100
Strong * Property is
NO READ / Write UP or Down
101
A Security Model will dictate what?
How a system will enforce security
102
The main security models are?
1. Bell-Lapadula 2. BIBA 3. Clack-Wilson
103
Static Ram is used For?
CACHE
104
It uses a specific voltage to indicate a Bit Value of 1
Flash memory
105
Ram that looks ahead, and fetches the next block at the same time?
(EDO DRAM) | Extended Data Out DRAM
106
RAM the Synchronizes it self with the cpu clock for faster communucations?
Synchronous DRAM (SDRAM)
107
Makes up the Majority of computer RAM
DRAM
108
RAM that does not need to be continuously refreshed?
STATIC RAM (SRAM)
109
SRAM
STATIC RAM
110
RAM that need to be continuously refreshed?
DRAM = Dynamic RAM
111
DRAM
Dynamic RAM
112
Memory speed is represented in?
NS = Nanoseconds | Lower the NS the faster the Memory is.
113
The Two modes that Multi-processing units can operate in?
Symmetric | Asymmetric
114
The Symmetric Multi-processing mode
All processors are load balanced | (most common)
115
The Asymmetric Multi-processing mode
The processors can be completely dedicated to a task or application.
116
The Multi-processing mode used if Time-sensitivity is a must.
Asymmetric
117
The CPU Mode that allows anything to happen?
Kernel / privilege mode
118
privilege mode is also called?
Kernel mode or supervisor mode
119
user mode is also called?
problem state
120
The two CPU Mode?
privilege mode | User Mode
121
What is a list of pointers to process called?
Stack
122
Where is the Stack Pointer and program counter Helded at?
Special Registers
123
What Register points to the next instructions to be Executed?
Program Counter register
124
What are the 3 types of Registers?
1. General Registers 2. Program Counter Registers 3. Special Registers
125
Inside of a Computer is called?
ALU
126
ALU
Algorithmic Logic Unit (ALU)
127
What are the different View of an overall System?
1. Functionality 2. performance 3. Interoperability 4. Security
128
A collection of Document types to Document an Architecture in a formal manner?
(AD) Architecture Description
129
What Register holds variables and temporary results that the ALU will use as it executes instructions?
General Registers
130
PSW?
Program stats word
131
What is held in the special Registers?
(PSW) Program stats word
132
What component retains stored Data longer when cooled?
RAM
133
EEPROM
Electrically Erasable Programmable read only Memory
134
EPROM
Erasable Programmable read only Memory
135
what type of memory Uses a light to flash
(EPROM) Erasable Programmable read only Memory
136
PROM
Programmable read only Memory
137
what type of memory and only be written once?
(PROM) Programmable read only Memory