Security fundamentals
35 important questions on Security fundamentals
Hoe slaat het PBKDF2 cypher wachtwoorden op ?
What type of certificate does a CA have?
2. Wildcard Certs
3. Domain validation cert
4. Subject Alternative Name (SAN) Cert
5. Code signing cert
6. Computer/ Machine cert
If I am going to use a CA internally, what type of CA should I use?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
If I want to carry out B2B activity with third-party companies or sell products on the web, what type of CA should I use?
Who builds the CA or intermediary authorities?
Who signs X509 certificates?
What can I use to prevent my CA from being compromised and fraudulent certificates being issued?
If two entities want to set up a cross-certification, what must they set up first?
How can I tell whether my certificate is valid?
If the CRL is going slow, what should I implement?
How can I identify each certificate?
What format is a private certificate and what file extension does it have?
public p7b .cer
pem base64format .pem
der extension for pem .der
What should I do with my software to verify that it is original and not a fake copy?
What type of encryption will be used to encrypt large amounts of data?
What is the purpose of DH?
What is the first stage in any encryption, no matter whether it is asymmetric or symmetric?
If George encrypted data 4 years ago with an old CAC card, can he unencrypt the data with his new CAC card?
If Janet is digitally signing an email to send to John to prove that it has not been tampered with in transit, what key will they each use?
What two things does digitally signing an email provide?
non-repudiation
What asymmetric encryption algorithm should I use to encrypt data on a smartphone?
What shall I use to encrypt a military mobile telephone?
What is the difference between stream and block cipher modes, and which one will you use to encrypt large blocks of data?
Block Cipher: encrypt per block je gebruikt dit om groote blokken aan data te encrypten
What happens with cipher block chaining if I don't have all of the blocks?
Name two algorithms. If I want to ensure the protection of data, what shall I use?
Encryption wordt gebruikt om data te beschermen
Is a hash a one-way or two-way function, and is it reversible?
What are the strongest and weakest methods of encryption with an L2TP/IPSec VPN tunnel?
De slapste is DES
What is the name of the key used to ensure the security of communication between a computer and a server or a computer to another computer?
What should I do to protect data at rest on a laptop?
What should I do to protect data at rest on a tablet or smartphone?
What should I do to protect data at rest on a removable device, such as a USB flash drive or an external hard drive?
What two protocols could we use to protect data in transit?
tls
l2tp/ipsec tunneling
How can you protect data in use?
What type of attack tries to find two hash values that match?
What are the two purposes of Data Loss Protection (DLP)?
of worden verstuurd via usb
What is the process of obtaining a new certificate?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding