Deck 12: Advanced Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 12: Advanced Cryptography
1
A(n) ____ serves as the trusted third-party agency that is responsible for issuing the digital certificates.
A) RA
B) DA
C) CA
D) PA
A) RA
B) DA
C) CA
D) PA
C
2
The ____ model is the basis for digital certificates issued to Internet users.
A) third-party trust
B) related trust
C) managed trust
D) distributed trust
A) third-party trust
B) related trust
C) managed trust
D) distributed trust
D
3
____ certificates enable clients connecting to the Web server to examine the identity of the server's owner.
A) Personal digital
B) Public digital
C) Private digital
D) Server digital
A) Personal digital
B) Public digital
C) Private digital
D) Server digital
D
4
A ____ trust refers to a situation in which two individuals trust each other because each trusts a third party.
A) web of
B) mutual
C) third-party
D) distributed
A) web of
B) mutual
C) third-party
D) distributed
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ can verify the authenticity of the sender and enforce nonrepudiation to prove that the sender is who he claims to be and cannot deny sending it.
A) Symmetric encryption
B) Private encryption
C) Asymmetric encryption
D) Elliptic encryption
A) Symmetric encryption
B) Private encryption
C) Asymmetric encryption
D) Elliptic encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
With the ____ model, there is one CA that acts as a "facilitator" to interconnect all other CAs.
A) bridge trust
B) distributed trust
C) third-party trust
D) transitive trust
A) bridge trust
B) distributed trust
C) third-party trust
D) transitive trust
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
At the ____ stage of the certificate life cycle, the certificate can no longer be used.
A) creation
B) suspension
C) revocation
D) expiration
A) creation
B) suspension
C) revocation
D) expiration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ can protect the confidentiality of an e-mail message by ensuring that no one has read it.
A) Public encryption
B) Standard encryption
C) Asymmetric encryption
D) Symmetric encryption
A) Public encryption
B) Standard encryption
C) Asymmetric encryption
D) Symmetric encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Digital certificates cannot be used to identify objects other than users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ involves public-key cryptography standards, trust models, and key management.
A) Public key infrastructure
B) Network key infrastructure
C) Private key infrastructure
D) Shared key infrastructure
A) Public key infrastructure
B) Network key infrastructure
C) Private key infrastructure
D) Shared key infrastructure
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Security tools function at the same layer of the Open System Interconnection (OSI) model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components.
A) DP
B) CP
C) LP
D) AP
A) DP
B) CP
C) LP
D) AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ function is a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
A) Registration Authority
B) Certificate Authority
C) Repudiation Authority
D) Intermediate Authority
A) Registration Authority
B) Certificate Authority
C) Repudiation Authority
D) Intermediate Authority
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Cryptography cannot protect data as it is being transported across a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Digital signatures actually only show that the public key labeled as belonging to person was used to encrypt the digital signature.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.
A) Blocking
B) Hashing
C) Encrypting
D) Cloning
A) Blocking
B) Hashing
C) Encrypting
D) Cloning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The primary function of a(n) ____ is to verify the identity of the individual.
A) RA
B) CA
C) DA
D) PA
A) RA
B) CA
C) DA
D) PA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ certificates are frequently used to secure e-mail transmissions and typically only require the user's name and e-mail address in order to receive this certificate.
A) Private digital
B) Personal digital
C) Public digital
D) Server digital
A) Private digital
B) Personal digital
C) Public digital
D) Server digital
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A class 2 certificate is known as a ____ certificate.
A) signing digital
B) server digital
C) personal digital
D) code-signing
A) signing digital
B) server digital
C) personal digital
D) code-signing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
List three general duties of a CA.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____________________ may be defined as confidence in or reliance on another person or entity.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
List the three PKI trust models that use a CA.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
At the ____ stage of the certificate life cycle, the certificate is no longer valid.
A) creation
B) suspension
C) revocation
D) expiration
A) creation
B) suspension
C) revocation
D) expiration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
List the four stages of a certificate life cycle.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____ allows clients and the server to negotiate independently encryption, authentication, and digital signature methods, in any combination, in both directions.
A) SFTP
B) SHTTP
C) HTTPS
D) Telnets
A) SFTP
B) SHTTP
C) HTTPS
D) Telnets
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Explain the difference between key revocation versus key suspension.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Explain how digital certificates are managed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
List two requirements for verification of an EV SSL.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
List three pieces of information a digital certificate typically contains.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
TLS is an extension of ____.
A) Telnet
B) HTTP
C) SSL
D) FTP
A) Telnet
B) HTTP
C) SSL
D) FTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Key ____ removes all private and public keys along with the user's identification information in the CA.
A) renewal
B) escrow
C) generation
D) destruction
A) renewal
B) escrow
C) generation
D) destruction
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
In SSH, the ____________________ command allows a user to log on to a remote computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Key ____ refers to a process in which keys are managed by a third party, such as a trusted CA.
A) escrow
B) destruction
C) renewal
D) management
A) escrow
B) destruction
C) renewal
D) management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In SSH, the ____________________ command allows a user to copy files between remote computers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.
A) SSL
B) TLS
C) PEAP
D) EAP
A) SSL
B) TLS
C) PEAP
D) EAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Identify the general duties of an RA.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Discuss the three areas of protection that are provided by IPsec.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List and describe the entities for which IPsec is transparent.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck