Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
Exam Question 264 (p.282): Who knows Alice’s public key? |
everybody |
|
Exam Question 265 (p.282): Who knows Alice’s private key? |
Alice |
|
Exam Question 266 (p.282): Whose key, and which key do you use to send a private message to Bob? |
bob public |
|
Exam Question 267 (p.282): What is the purpose of encrypting a message? |
Prevent others from understanding it. |
|
Exam Question 268 (p.282): What is the purpose of signing a message? |
Prove authorship |
|
Exam Question 269 (p.282): Whose key, and which key do you use to sign a message? |
your private |
|
Exam Question 270 (p.282): How does signing prove authorship? |
private key is required and nobody else has it |
|
Exam Question 271 (p.282): How can Bob send a private, authenticated message to Alice? |
First, encrypt it with Bob’s private key to prove authorship. Second, encrypt the result with Alice’s public key to provide privacy. |
|
Exam Question 272 (p.282): What do public-key systems make possible? |
strangers can create shared secrets |
|
Exam Question 273 (p.282): Why is RSA special? |
public keys are easy to make |
|
Exam Question 274 (p.282): What is a prime number? |
A number with no proper factors. |
|
Exam Question 275 (p.283): Why are prime numbers used in encryption? |
easy to multiply but hard to find the original numbers
|
|
Exam Question 276 (p.283): What does the RSA private key consist of? |
two large prime numbers |
|
Exam Question 277 (p.283): What does the RSA public key consist of? |
private key numbers are multiplied to create public key |
|
Exam Question 278 (p.283): If RSA is so great, why are other things used? |
once you have a shared secret, other things are faster |
|
once you have a shared secret, other things are faster |
threat from outside your LAN |
|
Exam Question 280 (p.283): What is a botnet? |
A network of computers controlled by a hacker,usually without the knowledge of their real owners. |
|
Exam Question 281 (p.283): For what three things are botnets commonly used? |
Sending spam. Mining bitcoins. Doing attacks. |
|
Exam Question 282 (p.283): What does DDOS stand for? |
distributed denial of service |
|
Exam Question 283 (p.283): What is a zombie? |
A computer that is part of a botnet. |
|
Exam Question 284 (p.283): What does PWN stand for? |
own |
|
Exam Question 285 (p.283): What is an Inside Threat?
|
threat from inside your LAN
|
|
Exam Question 286 (p.283): What two things does server mean? |
(a) a program (software) that provides a service, (b)a computer (hardware) where such a program runs. |
|
Exam Question 287 (p.283): How can firewalls defend against network attacks on clients? |
outsiders cannot start conversations with clients |
|
Exam Question 288 (p.283): How can firewalls defend against network attacks on servers? |
outsiders can start a few conversations of specific type with servers |
|
Exam Question 289 (p.283): How does DDOS defeat firewall protection for servers? |
many outsiders can each start a conversation |
|
Exam Question 290 (p.283): What does DMZ stand for? |
demilitarized zone |
|
Exam Question 291 (p.283): What service does DMZ provide? |
It directs new conversation requests on all ports to one designated machine. |
|
Exam Question 292 (p.283): What service does port forwarding provide? |
It directs new conversation traffic on a few ports to a designated server. |
|
Exam Question 293 (p.283): How can sharing your Wi-Fi be dangerous? |
Bad people might get directly into your LAN. This bypasses your main firewall. |