N2K - Flash Cards - General Security Concepts - Explain the importance of using appropriate cryptographic solutions

(34 cards)

1
Q

Which type of encryption can encrypt an entire drive or series of drives?

A

Volume-Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which key-pair key should be encrypted and protected with a password when stored?

A

A private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of key management does Secure Multipurpose Internet Mail Extensions (S/MIME) use: centralized or decentralized?

A

Centralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are trusted entities issuing digital certificates validating the identity of entities in secure communication?

A

Certificate Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which certificates are used to secure multiple websites with a single SSL certificate?

A

Wildcard Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many levels up do wildcard certificates support?

A

Only one level up in the fully qualified domain name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between TPM and HSM chips?

A

Trusted Platform Module (TPM) chips are part of the motherboard. Hardware Security Module (HSM) chips are part of a PCI card that is mounted in a slot on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which algorithms are asymmetric key algorithms?

A

Rivest, Shamir, and Adleman (RSA)
Elliptic Curve Cryptosystem (ECC)
Diffie-Hellman
El Gamal
Digital Signature Algorithm (DSA)
Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default automated key-management protocol for IPSec?

A

Internet Key Exchange (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the technique of replacing sensitive data with unique identifiers to protect confidentiality during storage or transmission?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a TPM?

A

A dedicated processor that uses cryptographic keys to perform a variety of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be described as a distributed database accessible to all participants, recording transactions transparently, like in blockchain technology?

A

Open Public Ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term for unencrypted network traffic?

A

Cleartext Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the initial certificate in a hierarchy, ensuring authenticity and integrity of subsequent certificates in secure communications.

A

Root of Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What portion(s) of the IP packet are encrypted in IPSec transport mode?

A

The payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two chips are used to implement hardware-based encryption?

A

Trusted Platform Module (TPM) and Hardware Security Module (HSM) chips

17
Q

What is often found in mobile devices that is an isolated hardware/software environment for processing sensitive data?

A

Secure Enclave

18
Q

What is key escrow?

A

When you maintain a secured copy of a user’s private to ensure that you can recover the lost key

19
Q

What is the key length used by a one-time pad?

A

The key length is the same length as the message that is to be encrypted. The message length determines the key length.

20
Q

How is a digital signature created from a message digest?

A

It is encrypted using the sender’s private key.

21
Q

What type of encryption works with individual data entries in a database?

22
Q

Which public-key algorithm was the first to allow two users to exchange a secret key over an insecure medium without any prior secret keys?

A

Diffie-Hellman

23
Q

If Alice wants to encrypt a message using asymmetric encryption that only Bob can read, which key must she use?

A

Bob’s Public Key

24
Q

What is a digital proof of identity issued by an entity other than the recipient, facilitating secure online transactions?

A

Third-Party Certificate

25
Which component performs peer authentication and key exchange within the Internet Protocol Security (IPSec) protocol?
The Internet Key Exchange (IKE)
26
Which type of encryption safeguards the structure of a database and its contents?
Database-Level
27
Which hashing algorithm produces a message digest of 160 bits in length?
Secure Hash Algorithm (SHA-1)
28
What is the process of concealing original data with fictitious, but realistic, values to preserve usability while protecting sensitive information?
Data Masking
29
What is the term for the process of hiding data in an image?
Steganography
30
Certificate enrollment procedures typically require a user to provide proof of identity and which other item to a certification authority (CA)?
Public Key
31
What is contained within an X.509 CRL?
A list of serial numbers of unexpired or revoked digital certificates that should be considered invalid
32
Which type of cryptography is more secure: symmetric or asymmetric?
Asymmetric
33
Which private-key encryption algorithm does Pretty Good Privacy (PGP) use to encrypt data?
International Data Encryption Algorithm (IDEA)
34
What are the three issues that symmetric data encryption fails to address?
Data Integrity Repudiation Scalable Key Distribution