Exam 8: Electronic Mail Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
A
For the text type of body no special software is required to get the full meaning of the text aside from support of the indicated character set.
Free
(True/False)
4.7/5
(37)
Correct Answer:
False
The key legitimacy field, the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .
(Short Answer)
4.9/5
(38)
The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.
(True/False)
4.8/5
(30)
S/MIME cryptographic algorithms use __________ to specify requirement level
(Multiple Choice)
4.9/5
(39)
PGP incorporates tools for developing public-key certificate management and a public-key trust model.
(True/False)
4.9/5
(37)
PGP provides e-mail compatibility using the __________ encoding scheme
(Multiple Choice)
5.0/5
(39)
___________ is an open-source, freely available software package for e-mail security.
(Short Answer)
4.8/5
(32)
The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application.
(Short Answer)
4.8/5
(34)
E-banking, personal banking, e-commerce server, software validation and membership-based online services all fall into the VeriSign Digital ID _________
(Multiple Choice)
4.8/5
(31)
__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.
(Essay)
4.9/5
(32)
The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards
(Multiple Choice)
4.9/5
(34)
For the __________ subtype the order of the parts is not significant
(Multiple Choice)
4.8/5
(29)
S/MIME provides the following functions: enveloped data, signed data, clear signed data, and ________ .
(Short Answer)
4.9/5
(38)
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
(True/False)
4.7/5
(34)
The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data
(Multiple Choice)
4.8/5
(39)
The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.
(Short Answer)
4.9/5
(45)
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.
(Short Answer)
5.0/5
(34)
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)