Exam 3: Security Through Authentication and Encryption

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Is MD4 incorporated into Microsoft's MS-CHAP v2 hashing algorithm?

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

False

What encryption method does Red Hat Linux use by default?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

Does each security token have a unique identification number built into it, so that the authentication server can verify the security token before issuing a password?

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

What authentication method was designed using SSL as a model and is supported by the IETF as an Internet standard for secure communications?

(Multiple Choice)
4.8/5
(35)

With which version(s) of IP is IPSec compatible?

(Multiple Choice)
4.9/5
(29)

At what TCP/IP layer does IPSec secure communications?

(Multiple Choice)
5.0/5
(35)

What is the RSA key size used by MPPE when it is configured for strongest encryption?

(Multiple Choice)
4.7/5
(37)

In a(n) ____________________ attack every character combination is used in an attempt to determine the password of an account.

(Short Answer)
4.9/5
(34)

List eight different encryption techniques that are designed to help protect stored or transmitted data.

(Essay)
4.8/5
(38)

TLS uses private-key symmetric data encryption and the TLS Handshake Protocol for secure communications.

(True/False)
4.9/5
(29)

The ethereal sniffer software only functions on Linux/UNIX computers.

(True/False)
4.9/5
(29)

Which of the following operating systems recognizes the original NTLM logon authentication?

(Multiple Choice)
4.8/5
(36)

Which of the following cipher command-line parameters provides the account employing cipher with a new encryption key?

(Multiple Choice)
4.8/5
(34)

A secret key is used to both encrypt and decrypt data.

(True/False)
4.9/5
(37)

____________________ authenticates by using tickets to verify client and server communications, and employs private-key encryption.

(Short Answer)
4.8/5
(32)

When Windows 2000 Server or Windows Server 2003 is contacted by a client using IPSec configured in the Client (____________________) role, it will respond by using IPSec communication.

(Short Answer)
4.8/5
(24)

_____ is a set of IP-based secure communications and encryption standards created by the IETF, and was developed to provide secure network communications.

(Multiple Choice)
4.8/5
(34)

What needs to be installed in order for Windows 95 and Windows 98 to use NTLM v2?

(Multiple Choice)
5.0/5
(28)

Which of the following cipher command-line parameters decrypts the contents of the specified folder and sets the folder so that any files added to the folder are not encrypted?

(Multiple Choice)
4.9/5
(33)

Which authentication method employs a unique set of digital information or a digital signature with a communication or a file as a means to verify the source and uses public-key asymmetrical encryption?

(Multiple Choice)
4.9/5
(46)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)