Comptia GCGA Chapter 6 Flashcards
57 Questions
100 Views

Comptia GCGA Chapter 6 Flashcards

Created by
@IllustriousHoneysuckle

Questions and Answers

What does Integrity provide?

Assurances that data has not been altered

What does hashing ensure?

That data has retained integrity.

What is a hash?

A number derived from performing a calculation on data.

What are MD5 and SHA?

<p>Common hashing algorithms</p> Signup and view all the answers

What does Confidentiality ensure?

<p>Data is viewable only by authorized users.</p> Signup and view all the answers

What does Encryption protect?

<p>The confidentiality of data.</p> Signup and view all the answers

How does Encryption work?

<p>By scrambling or ciphering data.</p> Signup and view all the answers

What two things does Encryption normally need?

<p>An algorithm and a key</p> Signup and view all the answers

What is Symmetric Encryption?

<p>Same key to encrypt and decrypt.</p> Signup and view all the answers

What is Asymmetric Encryption?

<p>Two keys; public and private.</p> Signup and view all the answers

Anything encrypted with the public key can only be decrypted with the matching _________ key.

<p>private</p> Signup and view all the answers

Anything encrypted with the private key can only be decrypted with the matching _____ key.

<p>public</p> Signup and view all the answers

______ ciphers encrypt data one bit at a time.

<p>Stream</p> Signup and view all the answers

______ ciphers encrypt data in blocks.

<p>Block</p> Signup and view all the answers

What validates an identity?

<p>Authentication</p> Signup and view all the answers

What prevents a party from denying an action?

<p>Non-repudiation</p> Signup and view all the answers

_____ ______ provide authentication, non-repudiation, and integrity.

<p>Digital Signatures</p> Signup and view all the answers

How can you verify integrity?

<p>With hashing</p> Signup and view all the answers

What is an analogous term for hash?

<p>Checksum</p> Signup and view all the answers

What is Message Digest 5?

<p>128 bit-hash, shown as hexadecimal.</p> Signup and view all the answers

What are the four variations of SHA?

<p>SHA-0, SHA-1, SHA-2, SHA-3</p> Signup and view all the answers

Which SHA version is not used?

<p>SHA-0</p> Signup and view all the answers

Rootkits can modify what level files?

<p>System-level</p> Signup and view all the answers

What hashing method uses a fixed-length string of bits and a shared secret key?

<p>HMAC</p> Signup and view all the answers

What protocols use HMAC-MD5 and HMAC-SHA1?

<p>IPsec and TLS</p> Signup and view all the answers

What is md5sum.exe?

<p>Free application to calculate hashes.</p> Signup and view all the answers

Hashes will always ____ _____ ____ no matter how many times you calculate it.

<p>stay the same</p> Signup and view all the answers

Hashing is a _____ ____ ____ that creates a string of characters.

<p>one way function</p> Signup and view all the answers

You cannot ______ the hash to re-create the original file.

<p>reverse</p> Signup and view all the answers

How many bits are in MD5?

<p>128 bits</p> Signup and view all the answers

How many bits are in SHA-1?

<p>160 bits</p> Signup and view all the answers

How many bits are in SHA-2?

<p>224, 256, 384, 512</p> Signup and view all the answers

How many bits are in HMAC-MD5?

<p>128 bits</p> Signup and view all the answers

How many bits are in HMAC-SHA1?

<p>160 bits</p> Signup and view all the answers

Are MD5, SHA-1, SHA-2, SHA-3, SHA-0 used for encrypting data?

<p>False</p> Signup and view all the answers

What is an old Windows-based hashing algorithm that is backwards compatible?

<p>LANMAN</p> Signup and view all the answers

What does RACE Integrity Primitives Evaluation Message Digest stand for?

<p>RIPEMD</p> Signup and view all the answers

How many keys does AES use?

<p>128, 256 bit keys</p> Signup and view all the answers

What does RADIUS use for symmetric encryption?

<p>Shared keys</p> Signup and view all the answers

What type of encryption does RADIUS use?

<p>Symmetric</p> Signup and view all the answers

What is AES?

<p>Strong symmetric block cipher that encrypts data in 128 bit blocks.</p> Signup and view all the answers

What is RC4?

<p>Strong symmetric stream cipher.</p> Signup and view all the answers

What is Blowfish?

<p>64 bit block cipher.</p> Signup and view all the answers

What is Twofish?

<p>128 bit block cipher.</p> Signup and view all the answers

What are AES, DES, 3DES, Blowfish, Twofish, and RC4?

<p>All symmetric encryption</p> Signup and view all the answers

Although asymmetric encryption is very strong it is also very resource intensive.

<p>True</p> Signup and view all the answers

What is a certificate?

<p>Digital document that includes the public key and information on the owner of the certificate.</p> Signup and view all the answers

What is RSA?

<p>Asymmetric encryption method using both public and private keys.</p> Signup and view all the answers

What are the two primary categories of asymmetric keys?

<p>Static and Ephemeral</p> Signup and view all the answers

Does RSA use static or ephemeral keys?

<p>False</p> Signup and view all the answers

What does Perfect forward secrecy indicate?

<p>The systems do not reuse keys.</p> Signup and view all the answers

What encryption method is commonly used with small wireless devices?

<p>Elliptical Curve Cryptography</p> Signup and view all the answers

What is Diffie-Hellman?

<p>Secure method of sharing symmetric encryption keys over a public network.</p> Signup and view all the answers

What are the two Diffie-Hellman methods that use ephemeral keys?

<p>DHE, ECDHE</p> Signup and view all the answers

What is Quantum Cryptography?

<p>Based on quantum physics and photons.</p> Signup and view all the answers

During Quantum Cryptography, when a third party reads any of the photons in the stream, what happens?

<p>It will be obvious to the two parties trying to exchange the key that there is someone eavesdropping.</p> Signup and view all the answers

Web site encryption commonly uses a combination of what?

<p>both asymmetric and symmetric encryption</p> Signup and view all the answers

Study Notes

Integrity and Hashing

  • Integrity ensures that data has not been altered during transmission or storage.
  • Hashing is a method used to confirm data integrity by generating a unique number from input data, maintaining the integrity if the data remains unchanged.
  • MD5 and SHA are widely recognized hashing algorithms utilized for various data integrity checks.
  • A hash produces a condensed representation of data, making it useful for verification processes.

Confidentiality and Encryption

  • Confidentiality guarantees that sensitive data is accessible only to authorized users.
  • Encryption safeguards the confidentiality of data by transforming it into an unreadable format for unauthorized access.
  • Encryption requires an algorithm and a key; two key types include symmetric (same for encryption and decryption) and asymmetric (public and private keys).

Digital Signatures and Authentication

  • Authentication involves validating identity, ensuring a user is who they claim to be.
  • Non-repudiation prevents a party from denying their actions, particularly in communications.
  • Digital signatures provide authentication, non-repudiation, and integrity.

Hashing Characteristics

  • Hash functions are one-way functions that generate a fixed-length output, making it impossible to reverse-engineer the original data.
  • Hash values remain consistent for the same input, regardless of how many times generated.

Encryption Context

  • MD5 generates a 128-bit hash, SHA-1 produces a 160-bit hash, and SHA-2 supports various bit sizes (224, 256, 384, 512).
  • HMAC (Hashed Message Authentication Code) uses a shared secret key combined with a hash function for added security.
  • RADIUS employs symmetric encryption using shared keys, specifically for managing network access.

Symmetric and Asymmetric Ciphers

  • AES is a strong symmetric block cipher encrypting data in 128-bit blocks with key options of 128, 192, or 256 bits.
  • RC4 is a symmetric stream cipher, while Blowfish and Twofish are block ciphers with varying bit sizes (64-bit and 128-bit, respectively).
  • Asymmetric encryption, such as RSA, involves static keys and is computationally intensive.

Quantum and Diffie-Hellman Cryptography

  • Quantum Cryptography relies on principles of quantum physics, where interference indicates eavesdropping.
  • The Diffie-Hellman method is a secure way of exchanging symmetric keys over public networks, using static and ephemeral keys.

General Security Concepts

  • Perfect forward secrecy ensures unique keys for each session, preventing key reuse.
  • Certificates are digital documents containing public keys and owner information, essential for establishing secure connections.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz focuses on Chapter 6 of the Comptia GCGA course, specifically highlighting key concepts in cryptography. It includes terms related to data integrity, hashing, and common algorithms like MD5 and SHA. Test your understanding of these important security concepts through flashcards.

Use Quizgecko on...
Browser
Browser