Exam 8: Electronic Mail Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP

Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
Verified

A

For the text type of body no special software is required to get the full meaning of the text aside from support of the indicated character set.

Free
(True/False)
4.7/5
(37)
Correct Answer:
Verified

False

The key legitimacy field, the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .

(Short Answer)
4.9/5
(38)

The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.

(True/False)
4.8/5
(30)

S/MIME cryptographic algorithms use __________ to specify requirement level

(Multiple Choice)
4.9/5
(39)

PGP incorporates tools for developing public-key certificate management and a public-key trust model.

(True/False)
4.9/5
(37)

PGP provides e-mail compatibility using the __________ encoding scheme

(Multiple Choice)
5.0/5
(39)

___________ is an open-source, freely available software package for e-mail security.

(Short Answer)
4.8/5
(32)

The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application.

(Short Answer)
4.8/5
(34)

E-banking, personal banking, e-commerce server, software validation and membership-based online services all fall into the VeriSign Digital ID _________

(Multiple Choice)
4.8/5
(31)

__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.

(Essay)
4.9/5
(32)

The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards

(Multiple Choice)
4.9/5
(34)

For the __________ subtype the order of the parts is not significant

(Multiple Choice)
4.8/5
(29)

S/MIME provides the following functions: enveloped data, signed data, clear signed data, and ________ .

(Short Answer)
4.9/5
(38)

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.

(True/False)
4.7/5
(34)

The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data

(Multiple Choice)
4.8/5
(39)

The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.

(Short Answer)
4.9/5
(45)

The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.

(Short Answer)
5.0/5
(34)

Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)