Exam 3: Security Through Authentication and Encryption

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Triple DES is a standard adopted by the U.S. government to replace AES.

(True/False)
4.9/5
(42)

Which seven specific fields are contained in the ESP?

(Essay)
4.7/5
(34)

Which authentication method authenticates by using tickets to verify client and server communications, and employs private-key encryption?

(Multiple Choice)
4.9/5
(34)

List six of the common authentication methods in use today.

(Essay)
4.7/5
(41)

  If getting users to log off when they go home at night is a problem, which option should you modify in the figure above? If getting users to log off when they go home at night is a problem, which option should you modify in the figure above?

(Multiple Choice)
4.8/5
(41)

What size of keys can be used with SSL authentication?

(Multiple Choice)
4.9/5
(32)

Message Digest 4 takes the original data and adds padded spaces until the length of the data section is 456 bytes.

(True/False)
4.9/5
(43)

What command can be used from the command prompt window to configure EFS?

(Multiple Choice)
4.7/5
(32)

Session authentication works by giving each frame or packet an identification or sequence number.

(True/False)
4.9/5
(28)

Which authentication method is used in Internet and network communications, and employs a handshaking protocol for authentication plus RSA for encryption?

(Multiple Choice)
4.8/5
(32)

Which version of hashing algorithm takes 8-bit (one-byte) chunks and creates an encrypted message that is padded until its length can be divided by 16?

(Multiple Choice)
4.8/5
(39)

When following the ISO X.509 format, what basic set of encrypted information does a digital certificate include?

(Essay)
4.9/5
(35)

Authentication makes data unintelligible to everyone except its intended recipients.

(True/False)
4.8/5
(30)

Sniffer software turns the NIC on its host computer into a virtual listening ear, capturing the network traffic that goes across that NIC on a particular network segment.

(True/False)
4.9/5
(34)

Which of the following sniffer application can be used in Windows-based operating systems?

(Multiple Choice)
4.9/5
(39)

_____ is the use of a secret code or other means to disguise data that is stored on a computer or transported across a network.

(Multiple Choice)
4.8/5
(37)

Which of the following encryption algorithms is considered to be the most secure?

(Multiple Choice)
4.8/5
(47)

The ____________________ field in the AH uses a special counter to activate anti-replay so that the receiver can determine if it has already received a packet.

(Short Answer)
4.8/5
(30)

What type of encryption is used for remote connections into Windows 2000 Server and Windows Server 2003?

(Multiple Choice)
4.8/5
(37)

Is the maximum size of the private key in AES 256 bits in length?

(True/False)
5.0/5
(31)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)