Exam 6: Transport-Level Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The TLS Record Format is the same as that of the SSL Record Format.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

Two important SSL concepts are the SSL session and the SSL _________ .

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

connection

The SSL Record Protocol is used before any application data is transmitted.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

False

The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets.

(True/False)
4.9/5
(28)

TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.

(Short Answer)
4.9/5
(37)

A signature is created by taking the hash of a message and encrypting it with the sender's _________ .

(Short Answer)
4.8/5
(33)

ISSl/TLS includes protocol mechanisms to enable two TCP users to determine the security mechanisms and services they will use.

(True/False)
4.8/5
(33)

The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange.

(True/False)
4.7/5
(26)

Phase 3 completes the setting up of a secure connection of the Handshake Protocol.

(True/False)
4.8/5
(35)

__________ refers to the combination of HTTP and SSL to implement secure communication between a Web browser and a Web server.

(Short Answer)
4.8/5
(42)

_________ would appear to be the most secure of the three Diffie-Hellman options because it results in a temporary, authenticated key.

(Short Answer)
4.8/5
(38)

Microsoft Explorer originated SSL.

(True/False)
4.8/5
(37)

Sessions are used to avoid the expensive negotiation of new security parameters for each connection that shares security parameters.

(True/False)
4.9/5
(25)

__________ allows the client to set up a "hijacker" process that will intercept selected application-level traffic and redirect it from an unsecured TCP connection to a secure SSH tunnel.

(Short Answer)
5.0/5
(34)

_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted.

(Short Answer)
5.0/5
(39)

The encryption of the compressed message plus the MAC must increase the content length by more than 1024 bytes.

(True/False)
4.9/5
(33)

Unlike traditional publishing environments, the Internet is three- way and vulnerable to attacks on the Web servers.

(True/False)
4.8/5
(39)

The first element of the CipherSuite parameter is the key exchange method.

(True/False)
4.9/5
(44)

The certificate message is required for any agreed on key exchange method except fixed Diffie-Hellman.

(True/False)
4.9/5
(36)

Server authentication occurs at the transport layer, based on the server possessing a public/private key pair.

(True/False)
4.9/5
(40)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)