WITH CORRECT ACTUAL QUESTIONS AND
CORRECTLY WELL DEFINED ANSWERS
LATEST 2024 – 2025 ALREADY GRADED A+
Key Management - ANSWERS-process of working with keys
Centralized - ANSWERS-PKI. Using centralized server, process can be
managed with a large single system. . large scale system is more
vulnerable to attack
Decentralized - ANSWERS-WEB PGP/GPG. Allows process to be pushed
out into organization or environment.
Key storage - ANSWERS-where you keep them
,Key recovery - ANSWERS-info stored using older keys is inaccessible
using a newer key
Key escrow - ANSWERS-storage of info with a third party
Key archives - ANSWERS-keys currently and actively being used
NAT - ANSWERS-effectively hides your network from the world
Quarantine portal - ANSWERS-redirects user to a quarantine area
where fixes can be accessed. Usually a web page with hyperlinks to the
fixes. Once necessary software is installed the system is then in
compliance.
Captive Portal - ANSWERS-Captures or redirects the users initial traffic
because something more is needed from the user, such as a credit card,
or user name and password.
Identification vs Authentication - ANSWERS-Identification is the claim of
who we are.
, Authentication is the most critical step in the identification process. It is
proving of a subjects claim to identification. - ANSWERS-
Authentication types - ANSWERS-Something you know (password or
PIN), Something you have (smart card, token, or device), Something
you are (fingerprints or retinal pattern), Something you do (keystroke
authentication), Somewhere you are (location)
Goals of Crypto - ANSWERS-Confidentiality (encryption),Integrity
(Hashing),Authentication (Prove yourself), Non-repudiation (can't deny
it happened-digital signatures)
TCP vs UDP - ANSWERS-UDP is "best effort" delivery with to nodes on a
network. Little overhead and is often used for streaming audio or video
traffic. TCP is reliable one-to-one connection between two hosts. Uses
3-way handshake (SYN-SYN ACK- ACK)
Network access control (NAC) - ANSWERS-goal is to prevent computers
with suboptimal security from potentially infecting other systems in the
network. Enforces policy.