Exam 15: Cryptographic Key Management and Distribution
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
__________ is an integer value unique within the issuing CA that is unambiguously associated with this certificate.
Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
C
X.509 is an important standard because the certificate structure
and authentication protocols defined in X.509 are used in a
variety of contexts.
Free
(True/False)
4.8/5
(31)
Correct Answer:
True
A _________ is any method for storing and retrieving PKI-related information, such as public key certificates and CRLs.
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
repository
X.509 dictates the use of a specific digital signature algorithm and
a specific hash function.
(True/False)
4.7/5
(30)
If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and
B.A _________ center is responsible for distributing keys to pairs of users as needed.
(Short Answer)
4.9/5
(28)
the secure use of cryptographic key algorithms depends on the
protection of the cryptographic keys.
(True/False)
4.8/5
(33)
A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.
(Short Answer)
4.8/5
(37)
the _________ can be an end user; a device such as a router or server; a process; or any item that can be identified in the subject name of a public key certificate.
(Multiple Choice)
4.9/5
(44)
A certificate consists of a public key, an identifier of the key owner,
and the whole block signed by a trusted third party.
(True/False)
4.9/5
(32)
Several techniques have been proposed for the distribution of public keys.the proposals can be grouped into the following four general schemes: public announcement, publicly available directory, public-key certificates, and ____________.
(Short Answer)
4.8/5
(38)
the heart of the X.509 scheme is the __________ certificate associate with each user.
(Short Answer)
4.9/5
(35)
__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.
(Multiple Choice)
4.9/5
(33)
__________ refers to the means of delivering a key to two parties who wish to exchange data, without allowing others to see the key.
(Multiple Choice)
5.0/5
(36)
If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.
(Multiple Choice)
4.7/5
(27)
Because certificates are forgeable they cannot be placed in a
directory without the need for the directory to make special
efforts to protect them.
(True/False)
4.9/5
(37)
the principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.
(Multiple Choice)
4.9/5
(26)
A __________ is a server or distributed set of servers that maintains a database of information about users.
(Multiple Choice)
4.8/5
(34)
One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.
(Multiple Choice)
4.7/5
(34)
the strength of any cryptographic system rests with the ___________ .
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)