Exam 4: Advanced Cryptography and PKI

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Stream ciphers work on multiple characters at a time.

(True/False)
4.9/5
(30)

Digital certificates should last forever.

(True/False)
4.9/5
(30)

What role does a key recovery agent fulfill in an enterprise environment?

(Essay)
4.9/5
(31)

Why is IPsec considered to be a transparent security protocol?

(Multiple Choice)
4.8/5
(35)

What is the S/MIME protocol used for?

(Essay)
4.9/5
(34)

Some cryptographic algorithms require that in addition to a key another value can or must be input.

(True/False)
4.8/5
(41)

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

(Multiple Choice)
4.8/5
(39)

Which of the following is a valid way to check the status of a certificate? (Choose all that apply. )

(Multiple Choice)
4.8/5
(39)

What protocol below supports two encryption modes: transport and tunnel?

(Multiple Choice)
4.8/5
(35)

The process by which keys are managed by a third party,such as a trusted CA,is known as?

(Multiple Choice)
4.8/5
(29)

What are the three areas of protection provided by IPSEC?

(Essay)
4.9/5
(36)

What is used to create session keys?

(Multiple Choice)
4.9/5
(29)

When two individuals trust each other because of the trust that exists between the individuals and a separate entity,what type of trust has been established?

(Multiple Choice)
4.8/5
(32)

What process will remove all private and public keys along with the user's identification information in the CA?

(Multiple Choice)
4.8/5
(29)

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

(Multiple Choice)
4.7/5
(37)

Select the secure alternative to the telnet protocol:

(Multiple Choice)
5.0/5
(38)

List the four stages of a certificate life cycle.

(Essay)
4.8/5
(41)

What type of trust model is used as the basis for most digital certificates used on the Internet?

(Multiple Choice)
4.9/5
(34)

Explain how digital certificates are managed.

(Essay)
4.8/5
(34)

What common method is used to ensure the security and integrity of a root CA?

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)