Review Questions - SYS701 - 7 - Cryptography and the PKI
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt the message?

  • Mike's private key
  • David's public key
  • Shared secret key (correct)
  • Mike's public key

Shahla recently discovered an attack where the attacker managed to force a network user to use weak encryption and was then able to decrypt that content. What term best describes this attack?

  • Downgrade (correct)
  • Collision
  • Homomorphic encryption
  • Birthday attack

Norm is using full-disk encryption technology to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?

  • Non-repudiation
  • Authentication
  • Confidentiality (correct)
  • Integrity

Brian discovers that a user suspected of stealing sensitive information is posting many image files to a message board. What technique might the individual be using to hide sensitive information in those images?

<p>Steganography (A)</p> Signup and view all the answers

Which one of the following statements about cryptographic keys is incorrect?

<p>All cryptographic keys should be kept secret. (A)</p> Signup and view all the answers

What type of cipher operates on one character of text at a time?

<p>Stream cipher (C)</p> Signup and view all the answers

Vince is choosing a symmetric encryption algorithm for use in his organization. He would like to choose the strongest algorithm from these choices. What algorithm should he choose?

<p>AES (D)</p> Signup and view all the answers

Kevin is configuring a web server to use digital certificates. What technology can he use to allow clients to quickly verify the status of those certificates without contacting a remote server?

<p>Certificate stapling (C)</p> Signup and view all the answers

Acme Widgets has 10 employees and they all need the ability to communicate with one another using a symmetric encryption system. The system should allow any two employees to securely communicate without other employees eavesdropping. If an 11th employee is added to the organization, how many new keys must be added to the system?

<p>10 (C)</p> Signup and view all the answers

Referring to the scenario in question 9, if Acme Widgets switched to an asymmetric encryption algorithm, how many keys would be required to add the 11th employee?

<p>2 (B)</p> Signup and view all the answers

What type of digital certificate provides the greatest level of assurance that the certificate owner is who they claim to be?

<p>EV (D)</p> Signup and view all the answers

Glenn recently obtained a wildcard certificate for *.mydomain.com. Which one of the following domains would not be covered by this certificate?

<p>dev. <a href="http://www.mydomain.com">www.mydomain.com</a> (C)</p> Signup and view all the answers

Which one of the following servers is almost always an offline CA in a large PKI deployment?

<p>Root CA (A)</p> Signup and view all the answers

Which one of the following certificate formats is closely associated with Windows binary certificate files?

<p>PFX (C)</p> Signup and view all the answers

What type of security solution provides a hardware platform for the storage and management of encryption keys?

<p>HSM (A)</p> Signup and view all the answers

What type of cryptographic attack attempts to force a user to reduce the level of encryption that they use to communicate with a remote server?

<p>Downgrade (C)</p> Signup and view all the answers

David would like to send Mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?

<p>Mike's public key (C)</p> Signup and view all the answers

When Mike receives the message that David encrypted for him, what key should he use to decrypt the message?

<p>Mike's private key (D)</p> Signup and view all the answers

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature?

<p>David's private key (B)</p> Signup and view all the answers

When Mike receives the digitally signed message from David, what key should he use to verify the digital signature?

<p>David's public key (A)</p> Signup and view all the answers

Flashcards

Shared Secret Key

A secret key used by both the sender and receiver to encrypt and decrypt messages.

Downgrade Attack

An attack forcing a user to use weak encryption to decrypt content.

Confidentiality

Protecting data from unauthorized disclosure.

Steganography

Hiding sensitive information inside other, non-suspicious files.

Signup and view all the flashcards

Stream Cipher

An encryption method that operates on one character at a time.

Signup and view all the flashcards

AES Encryption

Advanced Encryption Standard, a strong symmetric encryption algorithm.

Signup and view all the flashcards

Certificate Stapling

A technology allowing clients to quickly verify certificate status without contacting a remote server.

Signup and view all the flashcards

Symmetric Key Addition

Each additional employee requires keys to communicate with every other employee.

Signup and view all the flashcards

Asymmetric Key Addition

Adding an employee to an asymmetric system requires 2 keys: one public, one private.

Signup and view all the flashcards

EV Certificate

Provides the highest level of assurance about the certificate owner's identity.

Signup and view all the flashcards

Wildcard Certificate Limitations

A wildcard certificate does not cover sub-subdomains (e.g., dev.www.mydomain.com).

Signup and view all the flashcards

Root CA

Typically kept offline for security reasons, it's the top of the PKI hierarchy.

Signup and view all the flashcards

PFX Certificate

A certificate format often employed by Windows systems.

Signup and view all the flashcards

HSM

A hardware platform for storing and managing cryptographic keys.

Signup and view all the flashcards

Downgrade Attack

An attack that compels a user to use a lower encryption level.

Signup and view all the flashcards

Encrypt with Public Key

The sender encrypts a message with the recipient's public key.

Signup and view all the flashcards

Decrypt with Private Key

The recipient decrypts the message using their private key.

Signup and view all the flashcards

Sign with Private Key

The sender uses their private key to create a digital signature.

Signup and view all the flashcards

Verify with Public Key

The recipient employs the sender's public key to verify the digital signature.

Signup and view all the flashcards

Full-Disk Encryption

Protect sensitive information against theft.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser