List the layers of the OSI 7-Layer model
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data-Link
1. Physical
List the four fundamental components of a computer.
Processor
Primary Storage
Secondary Storage
Networking
Number of keys.
Asymmetric uses different keys to encrypt and decrypt a single message.
Symmetric only uses one.
Who signs the certificate of a Trusted Root Certificate Authority
The CA signs its own certificate
What is an error at OSI Layer 8?
8 is referred to as the social layer. An error indicates some human error in performing tasks or administration
Encoding, compression, and encryption
What is a "distribution" of Linux?
An Linux OS pre-packaged and pre-configured with OS customization/addons and user applications/utilities.
Provide one similarity and difference between encryption and hashing.
Similar in data obfuscation.
However, hashing should not be reversible and is typically less computationally expensive.
List four categories of information that can be included in a cipher suite.
- Key agreement method
- Symmetric encryption algorithm or data transfer encryption algorithm
- Asymmetric Encryption Algorithm or authentication/signature
- Hashing Algorithm
Define the "Next-Hop" in a network route.
Next-Hop refers to the next networking device at a certain OSI layer that the message should be passed to in order to reach final destination.
Describe two methods of multiplexing at the Physical Layer.
FDM: Assigning unique frequency ranges to multiple conversations
WDM: Optical mediums, assigning light wavelength to conversations
TDM: Granting access to medium in certain time intervals
CDM: Orthogonal encoding to combine data at bit level
The root domain
Identify which asymmetric keys are used to encrypt and decrypt messages when to goal is:
1. Confidentiality
2. Authenticity
Alice sends message to Bob.
Confidentiality: encrypt with BPub and decrypt BPriv
Authenticity: encrypt with APriv and decrypt APub
At what point in TLS handshake can symmetric-encrypted messages be sent?
As soon as ChangeCipherSpec message is sent
List the three main methods of authentication
1. Something you know
1. Something you have
2. Something you are
Provide the following for the network 56.100.3.24/29:
- Network Address
- Broadcast Address
- Subnet Mask
- Number of Usable Hosts
Network Address: 56.100.3.24
Broadcast Address: 56.100.3.31
Subnet Mask: 255.255.255.248
No. of Usable Hosts: 6
Where is the hypervisor located in hosted vs bare-metal virtualization
Hosted: As an application on top of host operating system
Bare-Metal: directly on top of the hardware
What math problems do the following signature algorithms rely on for key security:
1. DSA
2. RSA
1. Discrete Logarithm problem
2. "Factoring Problem" - factoring large semiprime
What two responsibilities are we "trusting" a Certificate Authority with in PKI?
1. Authenticate entities the CA signs for
2. Protect own private keys
Describe difference between signature and heuristics-based security.
Signature: use defined Indicator of Compromise to identify conditions for malicious activity
Heuristics: Look for abnormal behavior, relies on a baseline
Subnet the network 192.168.8.0/22 into networks that can support:
- 300 hosts
- 127 hosts
- 10 hosts
Provide network addresses and CIDR values
192.168.8.0/23
192.168.9.0/23
192.168.10.0/28
List five responsibilities of an Operating System
File & Data Management
Memory Management
Device Management
Process Management
Fault Management
Security
Communication/Networking
Describe the security concerns with the above encrypted image and what caused it.
Encryption algorithm did not introduce enough randomness. The data is somewhat recognizable in ciphertext.
What symmetric cryptography tool provides authentication and integrity in a message similar to a digital signature?
Hash-Based Message Authentication Code
or
Keyed-Hash Message Authentication Code
Describe Perfect Forward Secrecy
Data will remain confidential in the future even if key material is compromised