• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

Exam Question 264 (p.282): Who knows Alice’s public key?

everybody

Exam Question 265 (p.282): Who knows Alice’s private key?

Alice

Exam Question 266 (p.282): Whose key, and which key do you use to send a private message to Bob?

bob public

Exam Question 267 (p.282): What is the purpose of encrypting a message?

Prevent others from understanding it.

Exam Question 268 (p.282): What is the purpose of signing a message?

Prove authorship

Exam Question 269 (p.282): Whose key, and which key do you use to sign a message?

your private

Exam Question 270 (p.282): How does signing prove authorship?

private key is required and nobody else has it

Exam Question 271 (p.282): How can Bob send a private, authenticated message to Alice?

First, encrypt it with Bob’s private key to prove authorship. Second, encrypt the result with Alice’s public key to provide privacy.

Exam Question 272 (p.282): What do public-key systems make possible?

strangers can create shared secrets

Exam Question 273 (p.282): Why is RSA special?

public keys are easy to make

Exam Question 274 (p.282): What is a prime number?

A number with no proper factors.

Exam Question 275 (p.283): Why are prime numbers used in encryption?

easy to multiply but hard to find the original numbers

Exam Question 276 (p.283): What does the RSA private key consist of?

two large prime numbers

Exam Question 277 (p.283): What does the RSA public key consist of?

private key numbers are multiplied to create public key

Exam Question 278 (p.283): If RSA is so great, why are other things used?

once you have a shared secret, other things are faster

once you have a shared secret, other things are faster

threat from outside your LAN

Exam Question 280 (p.283): What is a botnet?

A network of computers controlled by a hacker,usually without the knowledge of their real owners.

Exam Question 281 (p.283): For what three things are botnets commonly used?

Sending spam. Mining bitcoins. Doing attacks.

Exam Question 282 (p.283): What does DDOS stand for?

distributed denial of service

Exam Question 283 (p.283): What is a zombie?

A computer that is part of a botnet.

Exam Question 284 (p.283): What does PWN stand for?

own

Exam Question 285 (p.283): What is an Inside Threat?
threat from inside your LAN

Exam Question 286 (p.283): What two things does server mean?

(a) a program (software) that provides a service, (b)a computer (hardware) where such a program runs.

Exam Question 287 (p.283): How can firewalls defend against network attacks on clients?

outsiders cannot start conversations with clients

Exam Question 288 (p.283): How can firewalls defend against network attacks on servers?

outsiders can start a few conversations of specific type with servers

Exam Question 289 (p.283): How does DDOS defeat firewall protection for servers?

many outsiders can each start a conversation

Exam Question 290 (p.283): What does DMZ stand for?

demilitarized zone

Exam Question 291 (p.283): What service does DMZ provide?

It directs new conversation requests on all ports to one designated machine.

Exam Question 292 (p.283): What service does port forwarding provide?

It directs new conversation traffic on a few ports to a designated server.

Exam Question 293 (p.283): How can sharing your Wi-Fi be dangerous?

Bad people might get directly into your LAN. This bypasses your main firewall.