Sec 701 - Encryption Flashcards

1
Q

RA

A

Registration Authority - Accepts registration requests & authenticates the entity that makes a request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PBKDF2

A

Password-Based Key Derivation Function 2 - Key stretching algorithm used for protecting passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

A

Hash Message Authentication Code - Combines cryptographic hash function with a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaC

A

Infrastructure as Code - Manages infrastructure resources through scripts & templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CRC

A

Cyclic Redundancy Checks - Hash function used for error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DSA

A

Digital Signature Algorithm - Creates & verifies digital signatures, not suited for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA

A

One of the oldest & widely used public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VLSM

A

Variable Length Subnet Mask - Networking technique that divides an IP range into subnets with different subnet masks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECDSA

A

Used for IoT, no native encryption and used for digital signatures. Derived from Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TACACS

A

Networking protocol Uses TCP for reliable communication & encrypts ENTIRE payload. Is AAA compliant.

Terminal Access Controller Access Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SAE

A

802.11 network standard compliant, used with WPA3 personal. Hash of a generated key unique to each authentication to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PKCS

A

Public-key Cryptography Standards - Standards for cryptography that provide guidelines and APIs for cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IaM

A

Identity Access Management - User access control to specific network segments & resources based on roles & permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Ciphers

A

AES, DES, IDEA, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric Ciphers

A

DHE, ECC, RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

KEK

A

Key-Encryption-Key - Used in key management systems to add an extra layer of security when encrypting and decrypting

17
Q

PFS

A

Perfect Forward Secrecy - Strengthen security of session keys & encrypt/decrypt automatically

18
Q

IKE

A

Internet Key Exchange - Set up secure connections & exchange cryptographic keys in IPsec VPNs

19
Q

PSK

A

Pre-Shared Key - A secret key that has been established between the parties who are authorized to use it by means of some secure method

20
Q

RC4

A

Legacy stream cipher used in WEP

21
Q

Stream Cipher

A

Each plaintext digit is encrypted one at a time

22
Q

DES

A

Data Encryption Standard - Legacy symmetric-key block cipher. Influential but no longer used.

23
Q

TGT

A

Ticket Granting Ticket (Kerberos) - Secure token granted to a user after initial login, do not need to re-enter credentials every time they use a service.

24
Q

GCM

A

Combines Cyber Threat Monitoring (CTM) for encryption with an authentication mechanism to ensure both data confidentiality and integrity

25
IDEA
Form of symmetric key block cipher, REPLACED by AES
26
AES
Advanced Encryption Standard - Symmetric block cipher chosen by the US Govt. Replaces DES & IDEA
27
CFB
Cipher Feedback - Transforms a block cipher into a stream cipher, enables encryption of individual bits or bytes
28
CBC
Cipher Block Chaining - Chains cipher blocks together, each cipher text block depends on the previous block.
29
ECB
Simple mode of operation with a block cipher, used with symmetric key encryption