Part 3 Flashcards

(52 cards)

1
Q

What are 3 data categories?

A

Data at rest - in an information system as a saved file form or database form
Data in use - currently open and being actively edited
Data in motion - data transmitted via telecommunication lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are procedures that apply to the protection of both transmitting and receiving equipment as well as the data transmitted between?

A

COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the branch of cryptology that treats the principles, means, and methods of designing and using cryptosystems?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the branch of knowledge that treats the principles of cryptography and cryptoanalysis; and the activities involved in SIGINT and maintaining COMSEC?

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the analysis of encrypted messages; the steps or processes involved in converting encrypted messages into plain text without initial knowledge of the system or key employed in encryption?

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a derivative of cryptography in the sense that data is hidden in a message, the data is imbedded into a file to become invisible, examples, changing a file extension type?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 types of Meta Data?

A

Descriptive - describes a file for purposes - title, author, key word
Structural - how objects are put together - how pages are ordered into chapters
Administrative - information on how to handle a file - how it was created, who created it, who can access it, file type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some places to hide data?

A

Invisible context, headers, footers, notes, custom xml data, hidden rows and collumns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a type of algorithm that does not contain any encryption

A

Clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of encryption algorithm is cleartext that is to be encrypted?

A

Plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are procedures for formulas to perform encryption?

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are mathematical values entered into the algorithm?

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encrypted text?

A

Cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when a hash is not unique and data cannot be deciphered into the origial version?

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two types of Hash Algorithm?

A

MD5

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What supports all 5 pillars of IA?

A

The use of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a “one way hash” and is the property of a hash function that is configured to make reversing of the hash algorithm mathematically infeasible?

A

Pre Image Resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What concept is where hash algorithms cannot be designed to produce fixed outputs?

A

Hash Originality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are bytes of data within a transmission that is used to authenticate the message itself and ensures the data has not been modified in transit?

A

MAC - message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of encryption is one private key for both users?

A

Symetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the original encryption method?

22
Q

What is the most secure encryption method?

23
Q

What uses two keys and provides non repudiation?

A

Asymetric Encryption

24
Q

What is generated by using the private key of a key pair?

A

Digital signature

All naval networks are required to have digital signature sign ons for non repudiation

25
T or F | All hases are the same size regardless of the size of the text?
True
26
What is a trusted 3rd party agent that issues digital certificates
CA
27
What handles and processes certificate requests as well as authenticates users of the certificates?
RA RA obtains public keys from the users and verifies the private keys associated with the public keys held
28
When a digital certifcate is expired or is no longer needed it is moved here to ensure it is no longer used...
CRL
29
What is a "holding tank" of certificates
CR Centralized repository for storage and management of digital certificates
30
What are 2 files needed to run for trust structure for PKI?
A -alpha - DoD digital certificates for DoD root and intermediate CAs E -echo - Extended Certificate Authority (ECA) root and intermediate CAs
31
If the certificate serial number ... the response is? Is listed on the CRL? Is not listed on the CRL? Is not found or accessible?
"REVOKED" "GOOD" "UNKNOWN"
32
What is a mathematical formula used to support the Digital Signature Standard (DSS) encryption method?
DSA
33
Where are documentation requirements for DSA found?
FIPS 186-4
34
What dictates the role of Public Key within the certificate?
Key Usage Extensions
35
What uses algorithms to validate authenticity and integrity of software or information?
Digital Signature
36
What are two types of Extended Key Usage?
Critical | Non critical - informational
37
What is a thumbprint algorithm?
Another name for SHA-1 hash function
38
What is used to hide actual key algorithms? TLS used when McAfee talks to the ePO server
Key encipher
39
What is used to encrypt data in storage or transit but not cryptographic keys?
Data encipher
40
What is used in protocol handshake process?
Record Protocol
41
What allows encryption of telnet communications?
SSH slogin SCP All port 22
42
Why are certificates revoked?
Expired, compromised, no longer needed
43
What are used if higher privlages or more security is required?
Alt tokens | NSS / Sipr tokens
44
What allows a grace period for a user to log on before certificate is revoked?
OCSP | Online Certificate Status Protocol
45
What ensures certificates are current and valid?
Axway VA
46
What is the 5 step process for CLO
1- CAC inserted 2- PIN entered 3- after PKI certificate is retreived from CAC it verifies it is valid and from a trusted issuer 4- workstation verifies the Domain Controller certificate is valid and from a trusted issuer 5- if both valid, user is automatically logged onto the network
47
What is a robust middleware suite designed to seamlessly intergrate between CAC and applications?
CAC SCM 90
48
What validates digital certificates in most frequently used Mircosoft Windows Applications?
Desktop Validator (DV)
49
Where are tokens enrolled?
Enterprise Security Client (ESC)
50
What is the 5 step process for the Token Management System?
1- Token Processing System interacts with CAC by helping it store keys and certificates 2- Token Key Service generates symetric keys used for communication between TPS and CAC 3- the CA creates and revokes certificates stored on the CAC 4- if necessary the DRM archives and recovers keys (as applicable)
51
What is the 6 step data flow process through the NCVI / CLO
1- application is presented a digital certificate 2- CAPI layer is tasked with validating the cert 3- request is transferred from CAPI to DV revocation trust provider which then moves the request onto the DV service running on the system 4- the DV service will first check to see if this cert has been accepted or revoked prior by checking its cache 5- a response by the DV is given or a decision is made that the request has been unable to be verified 6- the DV revocation trust provider then passes the request status back to the application that initiated the validation request
52
What are 2 types of log files
Validation Authority - Admin log - Server log Desktop Validator