Exam 4: Advanced Cryptography and PKI
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
A certificate repository (CR)is a publicly accessible centralized directory of digital certificates.
Free
(True/False)
4.7/5
(35)
Correct Answer:
True
What cryptographic transport algorithm is considered to be significantly more secure than SSL?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
Which of the following certificates verifies the identity of the entity that has control over the domain name?
Free
(Multiple Choice)
4.7/5
(46)
Correct Answer:
C
What protocol,developed by Netscape in 1994,is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
(Multiple Choice)
4.7/5
(40)
What allows an application to implement an encryption algorithm for execution?
(Multiple Choice)
4.9/5
(36)
A document that describes in detail how a CA uses and manages certificates,as well as how end users register for a digital certificate,is known as?
(Multiple Choice)
4.9/5
(34)
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
(Multiple Choice)
4.8/5
(31)
Some CAs issue only entry-level certificates that provide domain-only validation.
(True/False)
4.8/5
(27)
What is a value that can be used to ensure that plaintext,when hashed,will not consistently result in the same digest?
(Multiple Choice)
4.8/5
(31)
Which of the following is an input value that must be unique within some specified scope,such as for a given period or an entire session?
(Multiple Choice)
5.0/5
(29)
What process links several certificates together to establish trust between all the certificates involved?
(Multiple Choice)
4.8/5
(31)
What protocol uses SSL or TLS to secure communications between a browser and a web server?
(Essay)
5.0/5
(39)
The Authentication Header (AH)protocol is a part of what encryption protocol suite below?
(Multiple Choice)
4.7/5
(33)
What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?
(Multiple Choice)
4.8/5
(31)
Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
(Multiple Choice)
4.9/5
(34)
What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks,and each block is then encrypted separately?
(Multiple Choice)
4.7/5
(26)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)