Part 3 Flashcards

1
Q

What are 3 data categories?

A

Data at rest - in an information system as a saved file form or database form
Data in use - currently open and being actively edited
Data in motion - data transmitted via telecommunication lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are procedures that apply to the protection of both transmitting and receiving equipment as well as the data transmitted between?

A

COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the branch of cryptology that treats the principles, means, and methods of designing and using cryptosystems?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the branch of knowledge that treats the principles of cryptography and cryptoanalysis; and the activities involved in SIGINT and maintaining COMSEC?

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the analysis of encrypted messages; the steps or processes involved in converting encrypted messages into plain text without initial knowledge of the system or key employed in encryption?

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a derivative of cryptography in the sense that data is hidden in a message, the data is imbedded into a file to become invisible, examples, changing a file extension type?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 types of Meta Data?

A

Descriptive - describes a file for purposes - title, author, key word
Structural - how objects are put together - how pages are ordered into chapters
Administrative - information on how to handle a file - how it was created, who created it, who can access it, file type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some places to hide data?

A

Invisible context, headers, footers, notes, custom xml data, hidden rows and collumns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a type of algorithm that does not contain any encryption

A

Clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of encryption algorithm is cleartext that is to be encrypted?

A

Plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are procedures for formulas to perform encryption?

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are mathematical values entered into the algorithm?

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encrypted text?

A

Cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when a hash is not unique and data cannot be deciphered into the origial version?

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two types of Hash Algorithm?

A

MD5

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What supports all 5 pillars of IA?

A

The use of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a “one way hash” and is the property of a hash function that is configured to make reversing of the hash algorithm mathematically infeasible?

A

Pre Image Resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What concept is where hash algorithms cannot be designed to produce fixed outputs?

A

Hash Originality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are bytes of data within a transmission that is used to authenticate the message itself and ensures the data has not been modified in transit?

A

MAC - message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of encryption is one private key for both users?

A

Symetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the original encryption method?

A

DES

22
Q

What is the most secure encryption method?

A

AES

23
Q

What uses two keys and provides non repudiation?

A

Asymetric Encryption

24
Q

What is generated by using the private key of a key pair?

A

Digital signature

All naval networks are required to have digital signature sign ons for non repudiation

25
Q

T or F

All hases are the same size regardless of the size of the text?

A

True

26
Q

What is a trusted 3rd party agent that issues digital certificates

A

CA

27
Q

What handles and processes certificate requests as well as authenticates users of the certificates?

A

RA

RA obtains public keys from the users and verifies the private keys associated with the public keys held

28
Q

When a digital certifcate is expired or is no longer needed it is moved here to ensure it is no longer used…

A

CRL

29
Q

What is a “holding tank” of certificates

A

CR

Centralized repository for storage and management of digital certificates

30
Q

What are 2 files needed to run for trust structure for PKI?

A

A -alpha - DoD digital certificates for DoD root and intermediate CAs

E -echo - Extended Certificate Authority (ECA) root and intermediate CAs

31
Q

If the certificate serial number … the response is?

Is listed on the CRL?

Is not listed on the CRL?

Is not found or accessible?

A

“REVOKED”

“GOOD”

“UNKNOWN”

32
Q

What is a mathematical formula used to support the Digital Signature Standard (DSS) encryption method?

A

DSA

33
Q

Where are documentation requirements for DSA found?

A

FIPS 186-4

34
Q

What dictates the role of Public Key within the certificate?

A

Key Usage Extensions

35
Q

What uses algorithms to validate authenticity and integrity of software or information?

A

Digital Signature

36
Q

What are two types of Extended Key Usage?

A

Critical

Non critical - informational

37
Q

What is a thumbprint algorithm?

A

Another name for SHA-1 hash function

38
Q

What is used to hide actual key algorithms?

TLS used when McAfee talks to the ePO server

A

Key encipher

39
Q

What is used to encrypt data in storage or transit but not cryptographic keys?

A

Data encipher

40
Q

What is used in protocol handshake process?

A

Record Protocol

41
Q

What allows encryption of telnet communications?

A

SSH
slogin
SCP

All port 22

42
Q

Why are certificates revoked?

A

Expired, compromised, no longer needed

43
Q

What are used if higher privlages or more security is required?

A

Alt tokens

NSS / Sipr tokens

44
Q

What allows a grace period for a user to log on before certificate is revoked?

A

OCSP

Online Certificate Status Protocol

45
Q

What ensures certificates are current and valid?

A

Axway VA

46
Q

What is the 5 step process for CLO

A

1- CAC inserted
2- PIN entered
3- after PKI certificate is retreived from CAC it verifies it is valid and from a trusted issuer
4- workstation verifies the Domain Controller certificate is valid and from a trusted issuer
5- if both valid, user is automatically logged onto the network

47
Q

What is a robust middleware suite designed to seamlessly intergrate between CAC and applications?

A

CAC SCM 90

48
Q

What validates digital certificates in most frequently used Mircosoft Windows Applications?

A

Desktop Validator (DV)

49
Q

Where are tokens enrolled?

A

Enterprise Security Client (ESC)

50
Q

What is the 5 step process for the Token Management System?

A

1- Token Processing System interacts with CAC by helping it store keys and certificates
2- Token Key Service generates symetric keys used for communication between TPS and CAC
3- the CA creates and revokes certificates stored on the CAC
4- if necessary the DRM archives and recovers keys (as applicable)

51
Q

What is the 6 step data flow process through the NCVI / CLO

A

1- application is presented a digital certificate
2- CAPI layer is tasked with validating the cert
3- request is transferred from CAPI to DV revocation trust provider which then moves the request onto the DV service running on the system
4- the DV service will first check to see if this cert has been accepted or revoked prior by checking its cache
5- a response by the DV is given or a decision is made that the request has been unable to be verified
6- the DV revocation trust provider then passes the request status back to the application that initiated the validation request

52
Q

What are 2 types of log files

A

Validation Authority

  • Admin log
  • Server log

Desktop Validator