Security fundamentals

35 important questions on Security fundamentals

Hoe slaat het PBKDF2 cypher wachtwoorden op ?

Doormiddel van het wachtwoord te storen in random salts.

What type of certificate does a CA have?

1.Self-Signed Certificate
2. Wildcard Certs
3. Domain validation cert
4. Subject Alternative Name (SAN) Cert
5. Code signing cert
6. Computer/ Machine cert

If I am going to use a CA internally, what type of CA should I use?

Private CA
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

If I want to carry out B2B activity with third-party companies or sell products on the web, what type of CA should I use?

Public CA

Who builds the CA or intermediary authorities?

Een architect bouwt de CA of Intermediary authorities

Who signs X509 certificates?

De CA Signeert de x509 certificaten

What can I use to prevent my CA from being compromised and fraudulent certificates being issued?

Certificate Pinning

If two entities want to set up a cross-certification, what must they set up first?

Bridge Trust Model

How can I tell whether my certificate is valid?

PGP gebruikt een trust model genaamd web of trust.

If the CRL is going slow, what should I implement?

OCSP Stapeling

How can I identify each certificate?

Via een Object Identifier (OID)

What format is a private certificate and what file extension does it have?

Private P12 .pfx
public p7b .cer
pem base64format .pem
der extension for pem .der

What should I do with my software to verify that it is original and not a fake copy?

Een Code Signing cert toevoegen

What type of encryption will be used to encrypt large amounts of data?

Symmetric algorithms

What is the purpose of DH?

Diffie helleman creert een veilige tunnel waarin beveiligde data verstuurd kan worden via een vpn connectie het gebruikt ike: udp port 500

What is the first stage in any encryption, no matter whether it is asymmetric or symmetric?

The first stage is key exchange tweede partij ontvangt een public key

If George encrypted data 4 years ago with an old CAC card, can he unencrypt the data with his new CAC card?

Nee, George moet het openen met zn oude key

If Janet is digitally signing an email to send to John to prove that it has not been tampered with in transit, what key will they each use?

Janet wil sign the email with her private key en john kan het bestand valideren met janet  public key

What two things does digitally signing an email provide?

intergrity
non-repudiation

What asymmetric encryption algorithm should I use to encrypt data on a smartphone?

EEC will be used to encrypt data on smartphone

What shall I use to encrypt a military mobile telephone?

AES-256

What is the difference between stream and block cipher modes, and which one will you use to encrypt large blocks of data?

Stream Cipher: encrypt per bit
Block Cipher: encrypt per block je gebruikt dit om groote blokken aan data te encrypten

What happens with cipher block chaining if I don't have all of the blocks?

Dan gaat de encryptie fout.

Name two algorithms. If I want to ensure the protection of data, what shall I use?

Hashing algorithms: sha-3 md5
Encryption wordt gebruikt om data te beschermen

Is a hash a one-way or two-way function, and is it reversible?

Hashing is one-way en kan niet worden teruggedraaid

What are the strongest and weakest methods of encryption with an L2TP/IPSec VPN tunnel?

de sterkste encryptie is AES
De slapste is DES

What is the name of the key used to ensure the security of communication between a computer and a server or a computer to another computer?

Een session key

What should I do to protect data at rest on a laptop?

Enable FDE (Full drive encryption) (Bitlocker)

What should I do to protect data at rest on a tablet or smartphone?

Fulle drive encryption (FDE)

What should I do to protect data at rest on a removable device, such as a USB flash drive or an external hard drive?

Full diskencryption (FDE)

What two protocols could we use to protect data in transit?

HTTPS
tls
l2tp/ipsec tunneling

How can you protect data in use?

Via Random access memory (RAM) full memory encryption

What type of attack tries to find two hash values that match?

Hash-Collision attack (mmickatz)

What are the two purposes of Data Loss Protection (DLP)?

VIA data loss protection kan er geen gevoelige informatie naar buiten worden gemaild
of worden verstuurd via usb

What is the process of obtaining a new certificate?

Via een certificate signing request (CSR)

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo