Exam 6: Advanced Cryptography
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
A sensitive connection between a client and a web server uses what class of certificate?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
Match the following terms to the appropriate definitions.
-A trust model that has multiple CAs that sign digital certificates
Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
E
In the SSH suite, the ____________________ command allows a user to copy files between remote computers.
Match the following terms to the appropriate definitions.
a.Bridge trust model
b.Certificate Authority (CA)
c.Certificate Repository
d.Digital certificate
e.Distributed trust model
Free
(Short Answer)
4.9/5
(41)
Correct Answer:
scp
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
(Multiple Choice)
4.9/5
(39)
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?
(Multiple Choice)
4.9/5
(30)
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
(Multiple Choice)
4.9/5
(34)
Match the following terms to the appropriate definitions.
-A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates
(Multiple Choice)
4.9/5
(32)
Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.
(Short Answer)
4.8/5
(39)
SSL and TLS keys of what length are generally considered to be strong?
(Multiple Choice)
4.9/5
(29)
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
(Multiple Choice)
4.9/5
(31)
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?
(Multiple Choice)
4.9/5
(31)
At what stage can a certificate no longer be used for any type of authentication?
(Multiple Choice)
4.8/5
(38)
Match the following terms to the appropriate definitions.
-A trusted third-party agency that is responsible for issuing digital certificates
(Multiple Choice)
4.9/5
(30)
What kind of certificate is typically used by an individual to secure e-mail transmissions?
(Multiple Choice)
4.9/5
(36)
In the SSH suite, the ____________________ command allows a user to log on to a remote computer.
(Short Answer)
4.8/5
(41)
Digital certificates cannot be used to identify objects other than users.
(True/False)
4.8/5
(34)
Match the following terms to the appropriate definitions.
-A trust model in which two individuals trust each other because each individually trusts a third party.
(Multiple Choice)
4.8/5
(45)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)