|
|
Created by Angela Lipford
over 7 years ago
|
|
Which X.509 cert cannot contain private keys and uses Base 64 format for encoding?
....BEGIN CERTIFICATE; END CERTIFICATE
Alternate to .CRT (Microsoft)
First Step in obtaining a certificate
Benefit of Online Status Protocol (OSCP)
Secures many domains
Key Escrow
Primary Advantage of the Certificate Authority (CA)
Certificate Chaining
Purpose of a salt?
Data in use is unencrypted when?
Disadvantage to very strong key lengths
Primary hurdle in securing low-power devices via cryptographic means ?
Finding plaintext messages that produce hash values of a message is what type of attack
First Successful algorithm for public key encryption and considered to be highly secure if sufficiently long keys is?
Diffie-Hellman (DH) is
Higher number DH groups have?
Exclusive oring (XORing) is used to
What password salting mechanism does Blowfish use?
Rotate by 13 places (ROT13) mostly used for?
Digital Signature Algorithm (DSA) is used to
PBKDF2 is used for
What cipher mode applies what Oring techniques to first plaintext block?
How does Electronic Cook Book cipher encrypt blocks
Counter Mode (CTM)
Galois/Counter Mode (GCM)
Which hash function was developed by the open academic community?
Which hashing algorithm is characterized by a 128-bit message digest but is considered to be weak and has since become a deprecated algorithm?
Captive Portals?
What replaced TKIP to make WPA2 more secure?
Port security protocol
What replaced Lightwieght Extensible Authentication Protocol (LEAP)?
Which authentication mechanism requires certificates?
Which authentication mechanism dos not requires certificates?
Protected Extensible Authentication Protocol (PEAP) is not technically an Extensible Authentication Protocol (EAP) method. What exactly is it?
Why is using WPA and TKIP a poor choice for secure wireless access points?
Pre-shared key (PSK) is a part of what authentication method
Wireless client authentication method for corporate wireless network?
Wildcard certificates secure
Subject Alternative Names secure
A certificate signing request (CSR) is used to create a certificate. What is the third party service used to receive the corresponding certificate
To fully prove ownship of a domiain need to have?
Certificate Pinning?
Weak validation of domain ownership?
What component makes website data secure for users
What must a system administrator initially do to set up a root certificate?
What is the best method for securing communications for users to server systems?
Computer certificates protect?
What certificate format is often used interchangeably with .P12
Which certificate uses only the distinguished encoding rules format?
What do we call subordinate certificates that increase security because they are not created from the root certificate?
An American company wants to sell its apps to users in the European Union. What must a developer do to validate their apps as legitimate to those users?
Hide known cards