Deck 6: Advanced Cryptography

Full screen (f)
exit full mode
Question
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?

A)Registration Authority
B)Certificate Authority
C)Repudiation Authority
D)Intermediate Authority
Use Space or
up arrow
down arrow
to flip the card.
Question
A framework for all of the entities involved in digital certificates for digital certificate management is known as:

A)Public key infrastructure
B)Network key infrastructure
C)Private key infrastructure
D)Shared key infrastructure
Question
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?

A)SSL
B)TLS
C)PEAP
D)EAP
Question
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

A)Certificate practice statement (CPS)
B)Certificate policy (CP)
C)Lifecycle policy (LP)
D)Access policy (AP)
Question
Why is IPsec considered to be a transparent security protocol?​

A)​IPsec packets can be viewed by anyone
B)​IPsec is designed to not require modifications of programs, or additional training, or additional client setup
C)​IPsec's design and packet header contents are open sourced technologies
D)​IPsec uses the Transparent Encryption (TE) algorithm
Question
What kind of certificate is typically used by an individual to secure e-mail transmissions?

A)Private digital
B)Personal digital
C)Public digital
D)Server digital
Question
​Select below the secure alternative to the telnet protocol:

A)​HTTPS
B)​TLS
C)​IPsec
D)​SSH
Question
Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature.
Question
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?

A)third-party trust
B)related trust
C)managed trust
D)distributed trust
Question
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:

A)Personal digital
B)Public digital
C)Private digital
D)Server digital
Question
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

A)bridge trust
B)distributed trust
C)third-party trust
D)transitive trust
Question
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?

A)Blocking
B)Hashing
C)Encrypting
D)Cloning
Question
The process by which keys are managed by a third party, such as a trusted CA, is known as?

A)Key escrow
B)Key destruction
C)Key renewal
D)Key management
Question
​SSL and TLS keys of what length are generally considered to be strong?

A)​128
B)​1024
C)​2048
D)​4096
Question
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
Question
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.​
Question
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.
Question
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?​

A)​TLS 3.0
B)​IPSec
C)GPG
D)​SSL
Question
Digital certificates cannot be used to identify objects other than users.
Question
What protocol below supports two encryption modes: transport and tunnel?

A)HTTPS
B)IPSec
C)SSL
D)TLS
Question
Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A trust model in which two individuals trust each other because each individually trusts a third party.
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A trust model with one CA that acts as a facilitator to interconnect all other CAs
Question
A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.
Question
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

A)Registration Authority
B)Delegation Authority
C)Certification Authority
D)Participation Authority
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by trusted third party.​
Question
At what stage can a certificate no longer be used for any type of authentication?

A)creation
B)suspension
C)revocation
D)expiration
Question
In the SSH suite, the ____________________ command allows a user to copy files between remote computers.
​Match the following terms to the appropriate definitions.​
a.​Bridge trust model
b.Certificate Authority (CA)​
c.Certificate Repository​
d.​Digital certificate
e.​Distributed trust model
Question
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?

A)web of
B)mutual
C)third-party
D)distributed
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server
Question
Using what mechanism below can the non-repudiation of an e-mail and its content be enforced?

A)Symmetric encryption
B)Private encryption
C)Asymmetric encryption
D)Elliptic encryption
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates
Question
What cryptographic transport algorithm is considered to be significantly more secure than SSL?

A)AES
B)HTTPS
C)ESSL
D)TLS
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
The type of trust relationship that can exist between individuals or entities.​
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate​
Question
In the SSH suite, the ____________________ command allows a user to log on to a remote computer.
Question
A sensitive connection between a client and a web server uses what class of certificate?

A)Class 1
B)Class 2
C)Class 3
D)Class 4
Question
____________________ may be defined as confidence in or reliance on another person or entity.
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A process in which keys are managed by a third party, such as a trusted CA​
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A trusted third-party agency that is responsible for issuing digital certificates​
Question
List two requirements for verification of an EV SSL.
Question
List the four stages of a certificate life cycle.
Question
List the three PKI trust models that use a CA.
Question
Explain how digital certificates are managed.
Question
Discuss the three areas of protection that are provided by IPsec.
Question
Explain the difference between key revocation versus key suspension.
Question
List and describe the entities for which IPsec is transparent.
Question
List three general duties of a CA.
Question
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A trust model that has multiple CAs that sign digital certificates
Question
Identify the general duties of an RA.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Advanced Cryptography
1
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?

A)Registration Authority
B)Certificate Authority
C)Repudiation Authority
D)Intermediate Authority
A
2
A framework for all of the entities involved in digital certificates for digital certificate management is known as:

A)Public key infrastructure
B)Network key infrastructure
C)Private key infrastructure
D)Shared key infrastructure
A
3
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?

A)SSL
B)TLS
C)PEAP
D)EAP
A
4
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

A)Certificate practice statement (CPS)
B)Certificate policy (CP)
C)Lifecycle policy (LP)
D)Access policy (AP)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Why is IPsec considered to be a transparent security protocol?​

A)​IPsec packets can be viewed by anyone
B)​IPsec is designed to not require modifications of programs, or additional training, or additional client setup
C)​IPsec's design and packet header contents are open sourced technologies
D)​IPsec uses the Transparent Encryption (TE) algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What kind of certificate is typically used by an individual to secure e-mail transmissions?

A)Private digital
B)Personal digital
C)Public digital
D)Server digital
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
​Select below the secure alternative to the telnet protocol:

A)​HTTPS
B)​TLS
C)​IPsec
D)​SSH
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?

A)third-party trust
B)related trust
C)managed trust
D)distributed trust
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:

A)Personal digital
B)Public digital
C)Private digital
D)Server digital
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

A)bridge trust
B)distributed trust
C)third-party trust
D)transitive trust
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?

A)Blocking
B)Hashing
C)Encrypting
D)Cloning
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The process by which keys are managed by a third party, such as a trusted CA, is known as?

A)Key escrow
B)Key destruction
C)Key renewal
D)Key management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
​SSL and TLS keys of what length are generally considered to be strong?

A)​128
B)​1024
C)​2048
D)​4096
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?​

A)​TLS 3.0
B)​IPSec
C)GPG
D)​SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Digital certificates cannot be used to identify objects other than users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What protocol below supports two encryption modes: transport and tunnel?

A)HTTPS
B)IPSec
C)SSL
D)TLS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A trust model in which two individuals trust each other because each individually trusts a third party.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A trust model with one CA that acts as a facilitator to interconnect all other CAs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

A)Registration Authority
B)Delegation Authority
C)Certification Authority
D)Participation Authority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by trusted third party.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
At what stage can a certificate no longer be used for any type of authentication?

A)creation
B)suspension
C)revocation
D)expiration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In the SSH suite, the ____________________ command allows a user to copy files between remote computers.
​Match the following terms to the appropriate definitions.​
a.​Bridge trust model
b.Certificate Authority (CA)​
c.Certificate Repository​
d.​Digital certificate
e.​Distributed trust model
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?

A)web of
B)mutual
C)third-party
D)distributed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Using what mechanism below can the non-repudiation of an e-mail and its content be enforced?

A)Symmetric encryption
B)Private encryption
C)Asymmetric encryption
D)Elliptic encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What cryptographic transport algorithm is considered to be significantly more secure than SSL?

A)AES
B)HTTPS
C)ESSL
D)TLS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
The type of trust relationship that can exist between individuals or entities.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
In the SSH suite, the ____________________ command allows a user to log on to a remote computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A sensitive connection between a client and a web server uses what class of certificate?

A)Class 1
B)Class 2
C)Class 3
D)Class 4
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ may be defined as confidence in or reliance on another person or entity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A process in which keys are managed by a third party, such as a trusted CA​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
A trusted third-party agency that is responsible for issuing digital certificates​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
List two requirements for verification of an EV SSL.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
List the four stages of a certificate life cycle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
List the three PKI trust models that use a CA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain how digital certificates are managed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss the three areas of protection that are provided by IPsec.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain the difference between key revocation versus key suspension.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
List and describe the entities for which IPsec is transparent.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List three general duties of a CA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Match the following terms to the appropriate definitions.
a. Bridge trust model
b. Certificate Authority (CA)
c. Certificate Repository
d. Digital certificate
e. Distributed trust model
f. key escrow
g. Public key Infrastructure (PKI)
h. Session keys
i. Third-party trust
j. Trust model
​A trust model that has multiple CAs that sign digital certificates
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Identify the general duties of an RA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.