Exam 6: Advanced Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.

(True/False)
4.7/5
(26)

Match the following terms to the appropriate definitions. -A process in which keys are managed by a third party, such as a trusted CA​

(Multiple Choice)
4.7/5
(26)

What protocol below supports two encryption modes: transport and tunnel?

(Multiple Choice)
4.8/5
(40)

List three general duties of a CA.

(Essay)
4.8/5
(38)

Using what mechanism below can the non-repudiation of an e-mail and its content be enforced?

(Multiple Choice)
4.9/5
(30)

Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.

(True/False)
4.8/5
(33)

Match the following terms to the appropriate definitions. -​A trust model with one CA that acts as a facilitator to interconnect all other CAs

(Multiple Choice)
4.9/5
(32)

Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:

(Multiple Choice)
4.7/5
(30)

​Select below the secure alternative to the telnet protocol:

(Multiple Choice)
5.0/5
(23)

____________________ may be defined as confidence in or reliance on another person or entity.

(Short Answer)
4.7/5
(38)

List and describe the entities for which IPsec is transparent.

(Essay)
5.0/5
(38)

The process by which keys are managed by a third party, such as a trusted CA, is known as?

(Multiple Choice)
4.9/5
(41)

Match the following terms to the appropriate definitions. -The type of trust relationship that can exist between individuals or entities.​

(Multiple Choice)
4.8/5
(27)

Explain the difference between key revocation versus key suspension.

(Essay)
4.8/5
(30)

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

(Multiple Choice)
4.8/5
(39)

When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?

(Multiple Choice)
4.8/5
(35)

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

(Multiple Choice)
4.8/5
(34)

List the three PKI trust models that use a CA.

(Essay)
4.9/5
(41)

What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?

(Multiple Choice)
4.8/5
(40)

A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.

(Short Answer)
4.8/5
(27)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)