Exam 7: Standards and Protocols
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
_______________ specifies the standard formats for public key certificates,certificate revocation lists,and attribute certificates.
(Short Answer)
4.8/5
(37)
For products evaluated by Common Criteria,the highest level of assurance is
(Multiple Choice)
4.7/5
(33)
_______________ is used to encrypt web traffic and uses port 443.
(Short Answer)
4.9/5
(41)
PGP uses private key encryption for encrypting and decrypting e-mail.
(True/False)
4.8/5
(25)
A popular program used to encrypt and decrypt e-mail and files is _______________.
(Short Answer)
5.0/5
(36)
_______________ defines standards for interactions and operations for four component types: the user,certificate authority,registration authority,and the repository for certificates.
(Short Answer)
5.0/5
(34)
The Certificate Management Protocol (CMP)defines the messages and operations required to provide certificate management services within the PKIX model.
(True/False)
4.9/5
(31)
_______________ is composed of two parts: the TLS Record Protocol and the TLS Handshake protocol.
(Short Answer)
4.8/5
(33)
WEP uses public key encryption so it has secure wireless communications.
(True/False)
4.9/5
(40)
The _______________ protocol was introduced by Netscape as a means of providing secure connections between the client and server for exchanging information.
(Short Answer)
4.8/5
(34)
The X.905 standard specifies formats for public key certificates.
(True/False)
4.8/5
(33)
Showing 21 - 40 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)