Exam 6: Transport-Level Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
The TLS Record Format is the same as that of the SSL Record Format.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
Two important SSL concepts are the SSL session and the SSL _________ .
Free
(Short Answer)
4.9/5
(40)
Correct Answer:
connection
The SSL Record Protocol is used before any application data is transmitted.
Free
(True/False)
4.9/5
(33)
Correct Answer:
False
The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets.
(True/False)
4.9/5
(28)
TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.
(Short Answer)
4.9/5
(37)
A signature is created by taking the hash of a message and encrypting it with the sender's _________ .
(Short Answer)
4.8/5
(33)
ISSl/TLS includes protocol mechanisms to enable two TCP users to determine the security mechanisms and services they will use.
(True/False)
4.8/5
(33)
The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange.
(True/False)
4.7/5
(26)
Phase 3 completes the setting up of a secure connection of the Handshake Protocol.
(True/False)
4.8/5
(35)
__________ refers to the combination of HTTP and SSL to implement secure communication between a Web browser and a Web server.
(Short Answer)
4.8/5
(42)
_________ would appear to be the most secure of the three Diffie-Hellman options because it results in a temporary, authenticated key.
(Short Answer)
4.8/5
(38)
Sessions are used to avoid the expensive negotiation of new security parameters for each connection that shares security parameters.
(True/False)
4.9/5
(25)
__________ allows the client to set up a "hijacker" process that will intercept selected application-level traffic and redirect it from an unsecured TCP connection to a secure SSH tunnel.
(Short Answer)
5.0/5
(34)
_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted.
(Short Answer)
5.0/5
(39)
The encryption of the compressed message plus the MAC must increase the content length by more than 1024 bytes.
(True/False)
4.9/5
(33)
Unlike traditional publishing environments, the Internet is three- way and vulnerable to attacks on the Web servers.
(True/False)
4.8/5
(39)
The first element of the CipherSuite parameter is the key exchange method.
(True/False)
4.9/5
(44)
The certificate message is required for any agreed on key exchange method except fixed Diffie-Hellman.
(True/False)
4.9/5
(36)
Server authentication occurs at the transport layer, based on the server possessing a public/private key pair.
(True/False)
4.9/5
(40)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)