Chapter 6

25 July 2022
4.7 (114 reviews)
59 test answers

Unlock all answers in this set

Unlock answers (55)
question
Digital signature
answer
Proof utilizing asymmetric cryptography, that the senders personal key was used to encrypt the digest.
question
Define a passport
answer
A document provided by a trusted 3rd party
question
Digital certificate
answer
A technology that used to associate a user's identity to a public key and that has been digitally signed by a trusted third party.
question
What information does a digital certificate contain?
answer
Owners name or alias, Owners public key, name of the issuer, digital signature of the issuer, serial number of the digital certificate, and the expiration date of the public key.
question
Certificate authority
answer
A trusted third party who is responsible for issuing digital certificates
question
Registration authority (RA)
answer
A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
question
Certificate repository
answer
a digital certificate manager
question
Duties of a CA
answer
Generate, issue, and distribute public key certificates. Distribute CA certificates. Generate and publish certificate status information. Provide a means for subscribers to request revocation. Revoke public key certificates. Maintain the security, availability, and continuity of certificate issuance signing functions.
question
Certificate signing request (CSR)
answer
specially formatted encrypted message that validates the information that the CA requires to issue a digital certificate.
question
Local registration authorities (LRA's)
answer
Another for of RA designed to help lessen congestion
question
Duties of an RA
answer
Receive, authenticate, and process certificate revocation requests. Identify and authenticate subscribers. Obtain a public key from the subscriber. Verify that the subscriber processes the asymmetric private key corresponding to the public key submitted for certification. (mainly they verify the identity of an individual)
question
Certificate Repository (CR)
answer
a publicly accessible centralized directory of digital certificates used to view the status of digital certificates.
question
Certificate Revocation
answer
Removing certificate rights.
question
Certificate Revocation list (CRL)
answer
a list of certificate serial numbers that have been revoked.
question
Online certificate status protocol (OCSP)
answer
performs a real time certificate status check.
question
OCSP stapling
answer
Web servers send queries to the OSCP responder at regular intervals to receive signed time-stamped responses. This is to help with real time verification congestion.
question
3 most common categories of Digital Certificates (DC)
answer
Personal DC's Server DC's software publisher DC's
question
Personal digital certificates (PDC)
answer
RA assigns directly to individual
question
Server digital certificates (SDC)
answer
Often this is a web server to client
question
What do Server digital certificates do (SDC)?
answer
Ensure authenticity of web server Ensure authenticity of cryptographic connection to web server
question
Extended Validation SSL Certificate (EV SSL) requirements are?
answer
CA must pass independent audit verifying that is follows EV standards. Legal existence of the owner must be verified. Website if the registered owner and has exclusive control of the domain name Authorizing individuals applying for a certificate must be verified by CA, and valid signature from an officer of the company must be provided
question
Software publisher digital certificates
answer
these are provided by software publishers to verify their programs are secure and un tampered with.
question
X.509 Digital Certificates
answer
Most widely accepted format for digital certificates, and internationally recognized.
question
Public Key infrastructure (PKI)
answer
Digital certificate managment
question
Public key cryptography standards (PKCS)
answer
PKI standards defined by RSA corporation.
question
Trust model
answer
they type of true relationship that can exist between individuals or entities.
question
Third party trust
answer
Trust is mutual because they trust the third party moderator
question
Hierarchical trust model
answer
Assigns a single hierarchy with one master CA called the root.
question
Distribution trust model
answer
Multiple CA's signing DC's. This prevents total loss if one private key is stolen since there are still many CA's left.
question
Bridge Trust model
answer
No single CA, but on CA that facilitates interconnection to all other CA's.
question
Managing PKI
answer
A method to managing multiple public keys consistently.
question
Certificate Policy (CP)
answer
Published set of governing rules for a PKI
question
Certificate practice statement (CPS)
answer
More technical document than a (CP) describing the management of certificates.
question
Certificate life cycle
answer
1. Creation 2. suspension 3. revocation 4. expiration
question
Key Escrow
answer
process by which 3rd parties manage keys.
question
Expiration
answer
some keys have expiration dates
question
Renewal
answer
Some existing keys can be renewed.
question
Revocation
answer
Sometimes keys need to be revoked. (these cannot be reinstated)
question
Recovery
answer
key recovery agent (KRA), or M-of-N control are two methods of recovery.
question
M-of-N control
answer
key is divided into specific number of parts, parts are distributed to other people (with an overlap so that multiple people have the same part) know as N group. If recovery is necessary then a smaller part of N group meets (M group) and agrees that it needs to be recovered.
question
Suspension
answer
Key suspension is set for a specific amount of time.
question
Destruction
answer
Removes all private and public keys along with user's identification information in the CA.
question
Secure Sockets Layer (SSL)
answer
One of the most common cryptographic transport algorithms.
question
Transport Layer Security (TLS)
answer
Another cryptographic transport algorithm. TLS is much more secure than SSL
question
Cipher suit
answer
named combination of the encryption, authentication, and message authentication code (MAC) algorithms used with SSL and TLS.
question
Strong key length?
answer
4096 length = best 2048 length = ok length < 2048 = not secure
question
Secure Shell (SSH)
answer
Encrypted alternative to Telnet protocol used to access remote computers.
question
Hypertext Transport Protocol Secure (HTTPS)
answer
Common use of TLS and SSL to secure communications between a browser and a web server.
question
IP Security (IPsec)
answer
suit for securing Internet Protocol (IP) communications.
question
IPsec is transparent to?
answer
Applications Users Software
question
IPsec areas of protection?
answer
authentication confidentiality key management
question
Authentication Header Protocol (AH)
answer
authenticates that packets received were sent from their source.
question
Encapsulating security payload (ESP)
answer
Supports authentication of sender and encryption of data
question
Internet Security Association and Key (ISAKMP/Oakley)
answer
generates the key and authenticates user utilizing tools such as digital certificates.
question
Transport mode
answer
encrypts only data portion (payload) of each packet, and leaves the header unencrypted.
question
IPsec supports which two encryption modes?
answer
Transport mode, and Tunnel mode.
question
Tunnel mode
answer
Encrypts both data and header.
question
Tunnel mode is used more with?
answer
Network to network
question
Transport mode is used when?
answer
device must see source and destination addresses to route a packet.