Encryption Basics
Hashing and Integrity
Certificates and PKI
IAM Basics
Real-World Use Cases
100

This type of encryption uses the same key to encrypt and decrypt data.

What is symmetric encryption?

100

This cryptographic process turns data into a fixed-length value and is not meant to be reversed.

What is hashing?

100

Trusted entity that issues and signs digital certificates

What is a Certificate Authority?

100

IAM stands for this.

What is Identity and Access Management?

100

A company wants to protect login accounts by requiring a password plus a second verification step.

What is multi-factor authentication (MFA)?

200

This type of encryption uses a public key and a private key.

What is asymmetric encryption?

200

This security goal means data has not been changed or tampered with.

What is integrity?

200

Self-signed CA certificate at the top of the chain

What is the root of trust?

200

This IAM principle means users should get only the permissions they need.

What is least privilege?

200

A website wants to protect data sent between a user’s browser and the server.

What is TLS?

300

This is the biggest challenge of symmetric encryption: both parties must share this securely first.

What is the secret key?

300

SHA-256 is an example of this.

What is a hashing algorithm?

300

Path from a certificate through intermediates to the root CA

What is the chain of trust?

300

This is a collection of permissions assigned to a user, group, or system.

What is an access policy?

300

A company wants to make access decisions based on a person's job or function in the organization.

What is role-based access control (RBAC)?

400

This symmetric encryption algorithm is widely used to protect files, disks, and data streams.

What is AES?


400

A company wants to check whether a downloaded file was modified. They should use this.

What is a hash?

400

Request sent to a CA containing the public key and identity

What is a CSR?

400

Access model where permissions are assigned to roles

What is RBAC?

400

A company wants to give users only the access they need to do their jobs, and no more.

What is least privilege?

500

These two hashing algorithms are deprecated and should not be used for secure hashing today.

What are SHA-1 and MD5?

500

Unlike encryption, hashing is generally described as this.

What is one-way or irreversible?

500

Real-time protocol used to check certificate status

What is OCSP?

500

Access model that considers subject, object, and context

What is ABAC?

500

A company wants to prove that a message really came from the claimed sender and was not altered in transit.

What is a digital signature?

M
e
n
u