IS3230 CHAPTER 13 Flashcards Preview

IS3230 ACCESS CONTROL, KEY INFRASTRUCTURE > IS3230 CHAPTER 13 > Flashcards

Flashcards in IS3230 CHAPTER 13 Deck (25):
1

The process of confirming the identity of a user is called ___.

AUTHENTICATION

2

An entity, usually a trusted third party, that issues digital certificates is called ___.

CERTIFICATE AUTHORITY (CA)

3

The certificate authorities list of invalid certificates is called ___.

CERTIFICATE REVOCATION LIST (CRL)

4

Applications or IT services delivered over the Internet rather than in a typical client/server model on a local area network is called ___.

CLOUD SERVICES

5

Ensuring that only the intended recipient can read the data is called ___.

CONFIDENTIALITY

6

The hardware or software system that transforms the clear text into cipher text is called ___.

CRYPTOSYSTEM

7

A protocol or an algorithm allowing two users to exchange a secret key over insecure communications is called ___.

DIFFIE-HELLMAN KEY EXCHANGE

8

This provides a stronger cryptographic result with a shorter key is called ___.

ELLIPTIC CURVE CRYPTOSYSTEM (ECC)

9

The process of applying an algorithm to clear-text (or plain-text) data, resulting in a cipher text is called ___.

ENCRYPTION

10

Ensuring the data has not been altered is called ___.

INTEGRITY

11

The range of values that construct a crypto system key is called ___.

KEYSPACE

12

The concept of ensuring an originator cannot refute the validity of a statement or document is called ___.

NON-REPUDIATION

13

A framework that consists of programs, procedures, and security policies that employs public key cryptography and the X.509 standard (digital certificates) is called ___.

PUBLIC KEY INFRASTRUCTURE (PKI)

14

An entity that is responsible for the registration and initial authentication of certificate subscribers is called ___.

REGISTRATION AUTHORITY (RA)

15

A public key crypto system based on factoring large numbers that are a product of two prime numbers is called ___.

RSA ASYMMETRIC ENCRYPTION ALGORITHM

16

1. PKI is also know as public key encryption.
TRUE OR FALSE

FALSE

17

2. Which of the following is an encryption key size length commonly used with public key algorithms?
1. 127
2. 255
3. 1.023
4. 2.048

2.048

18

3. Which of the following are examples of symmetric algorithms? (Select two)
1. RSA
2. 3DES
3. AES
4. Diffle-Hellman

3DES
AES

19

4. Which of the following are examples of asymmetric algorithms? (Select two)
1. RSA
2. 3DES
3. AES
4. Diffle-Hellman

RSA
Diffle-Hellman

20

5. Asymmetric encryption is faster than symmetric encryption.
TRUE OR FALSE

FALSE

21

6. A symmetric encryption algorithm provides which security services? (Select three)
1. Confidentiality
2. Identity
3. Authentication
4. Authorization
5. Non-repudiation

Confidentiality
Identity
Authentication

22

7. The RSA key length is ___.

1.024 bits

23

8. Which of the following is the standard for certificates?
1. X510
2. Certificate authority
3. X.509
4. Certificate validation

Certificate authority

24

9. Which of the following terms is the range of values that construct a crypto system key?
1. Key length
2. Key values
3. Keyspace
4. Key construction

Keyspace

25

10. Digital signature provide which of the following? (Select two)
1. Confidentiality
2. Integrity
3. Authentication
4. Authorization
5. Non-repudiation

Integrity
Non-repudiation