Cryptography, VPNs, and Cryptographic Services

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which cryptographic service ensures that data has not been altered in transit or storage?

  • Integrity (correct)
  • Key Exchange
  • Authentication
  • Confidentiality

In cryptography, what is achieved by using encryption algorithms?

  • Non-repudiation
  • Integrity
  • Confidentiality (correct)
  • Authentication

What is the primary difference between symmetric and asymmetric encryption?

  • Symmetric encryption is primarily used for authentication, while asymmetric encryption is used for confidentiality.
  • Symmetric encryption is more secure than asymmetric encryption.
  • Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys. (correct)
  • Symmetric encryption uses a public key, while asymmetric encryption uses a private key.

Which of the following is a characteristic of a good hash function?

<p>It is collision-resistant, making it difficult to find two different inputs that produce the same hash value. (A)</p>
Signup and view all the answers

How does a Certificate Authority (CA) contribute to the authentication process in asymmetric key cryptography?

<p>By issuing certificates that verify the authenticity of public keys. (C)</p>
Signup and view all the answers

Which of the following algorithms is considered a symmetric encryption algorithm?

<p>AES (D)</p>
Signup and view all the answers

What is the purpose of a digital signature?

<p>To verify the integrity and authenticity of a message. (A)</p>
Signup and view all the answers

Which of the following is a key exchange algorithm?

<p>Diffie-Hellman (D)</p>
Signup and view all the answers

In the context of cryptography, what does non-repudiation ensure?

<p>That the sender cannot deny having sent the message. (C)</p>
Signup and view all the answers

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

<p>It involves Certificate Authorities (CAs) to verify identities. (A)</p>
Signup and view all the answers

How does hashing contribute to data integrity?

<p>By creating a unique, fixed-size 'fingerprint' of the data that changes if the data is altered. (B)</p>
Signup and view all the answers

Which of the following is a primary goal of key management in cryptography?

<p>Ensuring the secure generation, storage, exchange, and use of cryptographic keys. (B)</p>
Signup and view all the answers

What is the role of a Registration Authority (RA) in the PKI framework?

<p>To verify the identity of a user requesting a digital certificate, before forwarding the request to a CA. (B)</p>
Signup and view all the answers

Which cryptographic service is primarily achieved through the use of Hashed Message Authentication Codes (HMAC)?

<p>Authentication and Integrity (D)</p>
Signup and view all the answers

Why is the length of the key a crucial factor in cryptographic algorithms?

<p>Longer keys generally provide higher security by increasing the number of possible key combinations. (C)</p>
Signup and view all the answers

Which of the following accurately describes a man-in-the-middle attack?

<p>An attacker intercepts communications between two parties, impersonating each to eavesdrop or manipulate the data. (A)</p>
Signup and view all the answers

Which of these choices describes the purpose of 'salting' in the context of password hashing?

<p>To add randomness to the hashing process, making rainbow table attacks less effective. (C)</p>
Signup and view all the answers

What is the primary reason for using both symmetric and asymmetric encryption in protocols like SSL/TLS?

<p>To combine the speed of symmetric encryption with the secure key exchange of asymmetric encryption. (A)</p>
Signup and view all the answers

Which of the following is most vulnerable to frequency analysis?

<p>A simple substitution cipher. (D)</p>
Signup and view all the answers

Which of the following is an advantage of asymmetric encryption compared to symmetric encryption?

<p>Simpler key distribution (D)</p>
Signup and view all the answers

What are the properties of a digital signature?

<p>Authentic, unalterable, not reusable, and cannot be repudiated (D)</p>
Signup and view all the answers

What are the advantages of using symmetric algorithms?

<p>Less Computational Power needed, faster encryption (A)</p>
Signup and view all the answers

If Alice wants to send an encrypted message to Bob using public-key cryptography, what key does Alice use to encrypt the message?

<p>Bob's public key (A)</p>
Signup and view all the answers

How would you best mitigate against replay attacks?

<p>Implement time stamps with a threshold and message sequences (D)</p>
Signup and view all the answers

Which of the following is an important part of a PKI framework?

<p>The use of asymmetric keys (A)</p>
Signup and view all the answers

Encryption provides the cryptographic service of ensuring data confidentiality.

<p>True (A)</p>
Signup and view all the answers

The primary goal of integrity services is to prevent unauthorized modification of information, ensuring that data remains consistent and trustworthy.

<p>True (A)</p>
Signup and view all the answers

A hash algorithm is reversible, meaning the original data can be recovered from the hash value.

<p>False (B)</p>
Signup and view all the answers

In symmetric encryption, the encryption and decryption keys are different, while in asymmetric encryption, they are the same.

<p>False (B)</p>
Signup and view all the answers

The MD5 algorithm generates a hash value of 256 bits, providing a stronger level of security compared to SHA-1.

<p>False (B)</p>
Signup and view all the answers

In the context of digital signatures, the private key is used to verify the signature, while the public key is used to create the signature.

<p>False (B)</p>
Signup and view all the answers

Adding a secret key to a hash function, as done in HMAC, enhances authenticity of the message.

<p>True (A)</p>
Signup and view all the answers

Digital signatures cannot be reused for different documents because they are uniquely tied to the signed data.

<p>True (A)</p>
Signup and view all the answers

A digital certificate can be self-signed and still be considered valid and trusted by other parties.

<p>False (B)</p>
Signup and view all the answers

The main purpose of a Certificate Authority (CA) is to issue and verify digital certificates, establishing trust in online transactions.

<p>True (A)</p>
Signup and view all the answers

Authentication is the process of ensuring that data has not been altered in transit, focusing on the integrity of the information.

<p>False (B)</p>
Signup and view all the answers

The Diffie-Hellman key exchange allows two parties to establish a shared secret key over an unsecure channel, even if an eavesdropper is present.

<p>True (A)</p>
Signup and view all the answers

The initialism CIA in cryptography refers to Certification, Integrity, and Availability.

<p>False (B)</p>
Signup and view all the answers

Using a longer key length in symmetric encryption (e.g., AES 256-bit instead of 128-bit) generally decreases the computational complexity and thus encryption time.

<p>False (B)</p>
Signup and view all the answers

The main goal of cryptography is to provide absolute and unbreakable security, preventing any possibility of data breaches or unauthorized access.

<p>False (B)</p>
Signup and view all the answers

In asymmetric encryption, the public key is kept secret by the owner, while the private key is distributed to anyone who needs to send encrypted messages.

<p>False (B)</p>
Signup and view all the answers

The main advantage of symmetric encryption over asymmetric encryption is its enhanced scalability, especially in scenarios with many communicating parties.

<p>False (B)</p>
Signup and view all the answers

The 'salt' used in hashing passwords should be a publicly known constant value to ensure consistency across different systems.

<p>False (B)</p>
Signup and view all the answers

SHA-256 produces a hash value of 128 bits.

<p>False (B)</p>
Signup and view all the answers

Using peer authentication methods, RSA is considered to be more secure than PSK.

<p>True (A)</p>
Signup and view all the answers

The integrity of a message is assured by using encryption.

<p>False (B)</p>
Signup and view all the answers

In PKI, the Registration Authority directly issues the digital certificates.

<p>False (B)</p>
Signup and view all the answers

A digital signature proves the sender's identity and is able to also encrypt the message.

<p>False (B)</p>
Signup and view all the answers

If two different sets of data produce the same hash value, this is known as a collision.

<p>True (A)</p>
Signup and view all the answers

Public Key Infrastructure (PKI) is designed to issue public keys, but not used for issuing private keys.

<p>True (A)</p>
Signup and view all the answers

Which VPN benefit primarily addresses the ability to support a growing number of connections and remote sites without significant infrastructure overhaul?

<p>Scalability (B)</p>
Signup and view all the answers

In a site-to-site VPN, how does a client typically interact with the VPN?

<p>The client is unaware of the VPN, as it is handled by the network infrastructure. (D)</p>
Signup and view all the answers

When comparing Authentication Header (AH) and Encapsulating Security Payload (ESP) in IPsec, what key difference affects their deployment?

<p>ESP provides encryption, while AH only provides authentication. (A)</p>
Signup and view all the answers

Why is the Internet Key Exchange (IKE) protocol essential for IPsec VPNs?

<p>It automates the key exchange process and establishes security associations (SAs). (A)</p>
Signup and view all the answers

Which hash algorithm are suitable for ensuring integrity, offering varying levels of security and performance?

<p>MD5 and SHA (B)</p>
Signup and view all the answers

During IKE Phase 1 negotiation, what is the primary goal?

<p>To establish a secure channel for negotiating IPsec security associations (SAs). (A)</p>
Signup and view all the answers

In the context of cryptography and VPNs, what does a transform set define?

<p>A combination of security protocols, such as encryption and authentication algorithms. (A)</p>
Signup and view all the answers

What is the purpose of configuring an Access Control List (ACL) when setting up an IPsec VPN?

<p>To define the 'interesting traffic' that should be protected by the VPN. (B)</p>
Signup and view all the answers

What command is required to enable ISAKMP?

<p><code>crypto map</code> (D)</p>
Signup and view all the answers

After configuring an IPsec VPN, which of the following actions is essential to verify its operation?

<p>Sending 'interesting traffic' across the VPN tunnel to initiate the IPsec connection. (D)</p>
Signup and view all the answers

How do Remote Access VPNs and Site-to-Site VPNs primarily differ in their application?

<p>Remote Access VPNs connect individual users to a network, and Site-to-Site VPNs connect entire networks. (A)</p>
Signup and view all the answers

If a network administrator needs to configure a VPN that must support both authentication and encryption, which IPsec protocol should they choose?

<p>ESP (A)</p>
Signup and view all the answers

Which command is used to configure the hash algorithm?

<p><code>hash sha</code> (A)</p>
Signup and view all the answers

Before encapsulating and authenticating traffic across the VPN tunnel what must be configured?

<p>All of the above (D)</p>
Signup and view all the answers

What benefit do VPNs provide when connecting to branch offices?

<p>VPNs offer a cost-effective and secure alternative to dedicated leased lines. (D)</p>
Signup and view all the answers

What is one of the benefits of IPsec tunnel mode?

<p>All of the above. (D)</p>
Signup and view all the answers

A network admin is configuring IPsec. Which task must he or she configure first?

<p>configure ISAKMP policy (B)</p>
Signup and view all the answers

What is a common step in troubleshooting IPsec VPN connectivity issues?

<p>Verifying that the ISAKMP and IPsec Security Associations (SAs) are active. (D)</p>
Signup and view all the answers

Where can you configure the peer address in ISAKMP?

<p>Use the <code>crypto isakmp key keystring hostname peer-hostname</code> command. (B)</p>
Signup and view all the answers

What is the lifetime of the security association seconds?

<p>900 seconds (B)</p>
Signup and view all the answers

If a technician configured both sides of the IPsec VPN tunnel, what is the next step?

<p>Send interesting traffic (D)</p>
Signup and view all the answers

What command is used to show crypto keys?

<p><code>show crypto isakmp sa</code> (C)</p>
Signup and view all the answers

What does implementing Perfect Forward Secrecy (PFS) do for the VPN tunnel?

<p>Requires re-keying using the Diffie-Hellman key exchange. (C)</p>
Signup and view all the answers

What are the benefits of VPNs?

<p>Cost Savings, Security, Scalability, Compatibility (B)</p>
Signup and view all the answers

Which ACL command permits ESP traffic for an IPsec tunnel?

<p><code>access-list acl permit esp source wildcard destination wildcard</code> (C)</p>
Signup and view all the answers

VPNs can offer cost savings by reducing the need for dedicated, expensive WAN connections.

<p>True (A)</p>
Signup and view all the answers

All VPNs provide only encryption, and do not offer authentication or data integrity features.

<p>False (B)</p>
Signup and view all the answers

Scalability is a benefit of VPNs, allowing organizations to easily add or remove connections as needed.

<p>True (A)</p>
Signup and view all the answers

A site-to-site VPN is typically used to allow individual users to connect securely to a central network from remote locations.

<p>False (B)</p>
Signup and view all the answers

Remote-access VPNs do not require the installation of VPN client software on the user's device.

<p>False (B)</p>
Signup and view all the answers

In a site-to-site VPN, the client device is directly aware of the VPN connection and handles the encryption/decryption processes.

<p>False (B)</p>
Signup and view all the answers

IPsec operates at the transport layer of the OSI model.

<p>False (B)</p>
Signup and view all the answers

The AH (Authentication Header) protocol only provides data integrity and authentication, without encryption.

<p>True (A)</p>
Signup and view all the answers

ESP (Encapsulating Security Payload) provides both encryption and authentication.

<p>True (A)</p>
Signup and view all the answers

The IKE (Internet Key Exchange) protocol is used to establish the security associations (SAs) in an IPsec connection.

<p>True (A)</p>
Signup and view all the answers

MD7 is a secure hash algorithm used for data integrity in IPsec.

<p>False (B)</p>
Signup and view all the answers

RSA is used only for encryption and cannot be used for authentication in IPsec.

<p>False (B)</p>
Signup and view all the answers

Diffie-Hellman is a key exchange algorithm used to securely exchange cryptographic keys over a public network.

<p>True (A)</p>
Signup and view all the answers

In transport mode, IPsec encrypts the entire IP packet, including the header.

<p>False (B)</p>
Signup and view all the answers

In tunnel mode, a new IP header is added to the original IP packet after encryption, providing additional security.

<p>True (A)</p>
Signup and view all the answers

IKE Phase 1 is primarily used to negotiate IPsec policies for secure traffic transmission.

<p>False (B)</p>
Signup and view all the answers

IKE Phase 2 is responsible for negotiating the IPsec security associations (SAs) to protect the data traffic.

<p>True (A)</p>
Signup and view all the answers

When configuring a site-to-site IPsec VPN, the 'crypto isakmp key' command is used to define the encryption algorithm.

<p>False (B)</p>
Signup and view all the answers

The 'access-list' command is used to define interesting traffic that will be protected by the VPN.

<p>True (A)</p>
Signup and view all the answers

The 'crypto ipsec transform-set' command is used to specify the encryption and authentication algorithms for IPsec.

<p>True (A)</p>
Signup and view all the answers

The crypto map only specifies which traffic to protect, and does not include security parameters for encryption or authentication.

<p>False (B)</p>
Signup and view all the answers

The 'show crypto isakmp sa' command is used to verify the status of the IPsec security associations.

<p>False (B)</p>
Signup and view all the answers

The 'show crypto ipsec sa' command displays the parameters and statistics related to the established IPsec security associations.

<p>True (A)</p>
Signup and view all the answers

If the ISAKMP SA state is 'QM_IDLE', the IKE Phase 1 negotiation was unsuccessful.

<p>False (B)</p>
Signup and view all the answers

Configuring 'pfs group24' provides weaker security than not enabling PFS.

<p>False (B)</p>
Signup and view all the answers

Flashcards

Integrity

Ensuring data has not been altered in transit or storage.

Authentication

Verifying the identity of a user, device, or other entity.

Confidentiality

Keeping information secret and available only to authorized users.

Symmetric Encryption

An encryption method using the same key for both encryption and decryption.

Signup and view all the flashcards

Asymmetric Encryption

Encryption method using different keys for encryption and decryption.

Signup and view all the flashcards

Hashing

A process that produces a unique, fixed-size output (hash) from any input.

Signup and view all the flashcards

HMAC

Used to confirm data integrity and authenticity.

Signup and view all the flashcards

Asymmetric Keys

To verify identities using asymmetric keys.

Signup and view all the flashcards

Certificate Authority (CA)

A trusted entity that issues digital certificates.

Signup and view all the flashcards

Key Exchange

A method for securely exchanging cryptographic keys over a public channel.

Signup and view all the flashcards

Digital Certificate

To prove bond or Pub key to subject, signed by Cert. Authority.

Signup and view all the flashcards

PKI (Public Key Infrastructure)

Used to distribute public keys within a network.

Signup and view all the flashcards

Registration Authority

Receives digital certificate request from users.

Signup and view all the flashcards

Confidentiality in Cryptography

A cryptographic service ensuring that data is accessible only to those authorized to view it.

Signup and view all the flashcards

Integrity in Cryptography

A cryptographic service providing proof that data has not been altered during transit or storage.

Signup and view all the flashcards

Authentication in Cryptography

The process of verifying the identity of a user, device, or another entity in a network.

Signup and view all the flashcards

Keyed-Hash Message Authentication Code

A technique for ensuring both integrity and authenticity of a message.

Signup and view all the flashcards

Certificate Authority

A trusted entity that issues digital certificates to verify the authenticity of entities.

Signup and view all the flashcards

Public Key Infrastructure

A framework that manages digital certificates and public keys for secure communication.

Signup and view all the flashcards

Symmetric vs Asymmetric

Comparing symmetric vs asymmetric encryption.

Signup and view all the flashcards

VPN Benefits Overview

Cost reductions, security enhancements, improved scalability and compatibility.

Signup and view all the flashcards

What is a Virtual Private Network?

A network that provides a secure connection over a public infrastructure, such as the Internet.

Signup and view all the flashcards

Remote-Access VPN

A VPN type where individual users connect to a central network.

Signup and view all the flashcards

Site-to-Site VPN

A VPN type that connects entire networks at different locations.

Signup and view all the flashcards

What is IPsec?

A framework of open standards that ensures private, secure communications over Internet Protocol (IP) networks through encryption.

Signup and view all the flashcards

What is Encryption?

The process of transforming readable data (plaintext) into an unreadable format (ciphertext).

Signup and view all the flashcards

What is AH?

A security protocol that provides authentication and integrity.

Signup and view all the flashcards

What is ESP?

A security protocol that provides confidentiality, authentication, and integrity.

Signup and view all the flashcards

Role of Internet Key Exchange (IKE)

The negotiation of security associations (SAs) between IPsec peers.

Signup and view all the flashcards

AES (Advanced Encryption Standard)

Used to encrypt and decrypt data.

Signup and view all the flashcards

Pre-Shared Key

Uses the same secret key on both sides of the VPN tunnel to set up a secure channel.

Signup and view all the flashcards

IPsec Policy

A set of security protocols with which to negotiate, and implement IPsec.

Signup and view all the flashcards

Crypto Map

Links together many of the components, such as the ACL, transform set, and the peer.

Signup and view all the flashcards

Transform Set

Ensures encrypted information arrives to the destination uncompromised.

Signup and view all the flashcards

What is Diffie-Hellman group?

A parameter used in key exchange algorithms, determining the size of the key used for encryption.

Signup and view all the flashcards

Authentication with PSK

Uses a secret key available to both peers to authenticate packets.

Signup and view all the flashcards

RSA

Used for increased security and is more complex and scalable than PSK

Signup and view all the flashcards

VPN benefits

Cost Savings,Security,Scalabillity,Compatibility

Signup and view all the flashcards

AH Protocol specifics

AH provides data origin authentication, data integrity, and anti-replay protection. It does not provide confidentiality (encryption).

Signup and view all the flashcards

ESP Protocol specifics

ESP provides confidentiality (encryption), data origin authentication, data integrity, and anti-replay protection.

Signup and view all the flashcards

Purpose of IKE

Negotiates security associations (SAs) between two IPsec peers, setting the stage for a secure connection.

Signup and view all the flashcards

IKE negotiations.

Phase 1: Establishes a secure channel and Phase 2: Creates the IPsec tunnel for secure data transfer.

Signup and view all the flashcards

IPsec VPN

A method of ensuring secure communication by encrypting data packets.

Signup and view all the flashcards

IPsec Configuration

Configuring security policies and steps for a secure transfer.

Signup and view all the flashcards

Configure ISAKMP policy

To verify identities between the two end points

Signup and view all the flashcards

Apply a Crypto Map

Integrates security components for IPsec VPNs.

Signup and view all the flashcards

Verify IPsec VPN

Check the IPsec tunnel is working and operational.

Signup and view all the flashcards

Transport mode

This mode encrypts only the payload of the packet; the header is not protected.

Signup and view all the flashcards

Tunnel Mode

The entire IP packet is encrypted, and a new IP header is added for transmission.

Signup and view all the flashcards

Study Notes

Existing ACL Configurations

  • ACL syntax for IPsec traffic includes access-list commands for UDP (isakmp), ESP, and AHP protocols.
  • Rules to permit icmp, udp, esp, and ahp protocols include source and destination wildcard to determine IPsec negotiations

Configuring a New ISAKMP Policy

  • Commands include setting authentication, encryption, Diffie-Hellman group, hash, and lifetime, and negating a command or to set its defaults.

XYZCORP ISAKMP Policy Configuration

  • Global IKE policy protection suite incorporates AES encryption (256 bit keys), Secure Hash Standard, Pre-Shared Key, Diffie-Hellman group #24 (2048 bit, 256 bit subgroup)

Pre-Shared Key Configuration

  • The commandcrypto isakmp key keystring address peer-address and crypto isakmp key keystring hostname peer-hostname configure a pre-shared key

Define an ACL to Define Interesting Traffic

  • ACL configuration for interesting traffic is configured using the access-list command

Configuring a Crypto Map

  • A crypto map identifies the crypto map set and indicates whether to use IKE or manual establishment of IPsec Security Associations (SAs).
  • Configuration commands include default, description, dialer, exit, match, no, qos, reverse-route and set.

Default Crypto Map

  • By default new crypto maps will remain disabled until peer and valid access list have been configured

Crypto Map Configuration

  • Crypto map can be configured to match address, set transform-set, set peer address, set pfs group, and set security-association lifetime.

Send Interesting Traffic

  • Verification of configuration can be observed using ping ip x.x.x.x source x.x.x.x

Verify ISAKMP Configuration

  • Verification of configrations can be observed using show crypto isakmp sa to show ISAKMP SA information

Verify IPsec Configuration

  • Verification of configuration can be observed using show crypto ipsec sa to show IPsec SA information

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cryptography Concepts Quiz
4 questions
Introduction to Cryptography
40 questions

Introduction to Cryptography

RazorSharpStanza7259 avatar
RazorSharpStanza7259
Parte 23.
25 questions

Parte 23.

ThumbsUpObsidian8119 avatar
ThumbsUpObsidian8119
Cryptography and Network Security
40 questions
Use Quizgecko on...
Browser
Browser