Security Flashcards

1
Q

What is encryption at rest?

A

The encryption of persistent data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What contains an Access Token?

A

The security credentials for a login session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SOCKS

A

An internet protocol that exchanges packets from client to server through a proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack does HTTPS protect from?

A

Man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a public key certificate?

A

An electronic document used to prove the ownership of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TLS?

A

Transport Layer Security

Cryptographic protocols used to provide security over a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SSL replaced by?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 layers of the TLS protocol?

A

TLS record

TLS handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protocol is responsible for encryption in HTTPS?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of cipher is used in public key cryptography?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What entity assigns digital certificates?

A

CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the control protocol called at the beginning of a TLS connection?

A

Handshake
This protocol is used to exchange all the information required by both sides for the exchange of the actual application data by TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What proves the ownership of a public key?

A

A digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Through what is Alice’s message transferred to Bob?

A

The medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is the attacker?

A

Eve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In cryptography, does Even access to the medium?

17
Q

What is the goal of cryptography?

A

Protect the plaintext against Eve

18
Q

What is the plaintext letter in cryptography?

19
Q

What is the ciphertext letter in cryptography?

20
Q

What is the cipher?

A

The algorithm used to convert the plaintext to the ciphertext

21
Q

What is the key?

A

Information only known by Alice and Bob

22
Q

What is p – c?

A

Encryption

23
Q

What is c – p?

A

Decryption

24
Q

What does the cipher typically use for encryption?

25
How do you call the study of codebreaking?
Cryptanalysis
26
How do you call the study of codebreaking and encryption?
Cryptology
27
What is an alphabet in cryptography
The minimal information for information coding
28
What composes the CIA triad?
Confidentiality, Integrity, and Availability
29
What is commonly used for data integrity verification?
Hash values