Exam 6: Advanced Cryptography
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
(True/False)
4.7/5
(26)
Match the following terms to the appropriate definitions.
-A process in which keys are managed by a third party, such as a trusted CA
(Multiple Choice)
4.7/5
(26)
What protocol below supports two encryption modes: transport and tunnel?
(Multiple Choice)
4.8/5
(40)
Using what mechanism below can the non-repudiation of an e-mail and its content be enforced?
(Multiple Choice)
4.9/5
(30)
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.
(True/False)
4.8/5
(33)
Match the following terms to the appropriate definitions.
-A trust model with one CA that acts as a facilitator to interconnect all other CAs
(Multiple Choice)
4.9/5
(32)
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:
(Multiple Choice)
4.7/5
(30)
Select below the secure alternative to the telnet protocol:
(Multiple Choice)
5.0/5
(23)
____________________ may be defined as confidence in or reliance on another person or entity.
(Short Answer)
4.7/5
(38)
The process by which keys are managed by a third party, such as a trusted CA, is known as?
(Multiple Choice)
4.9/5
(41)
Match the following terms to the appropriate definitions.
-The type of trust relationship that can exist between individuals or entities.
(Multiple Choice)
4.8/5
(27)
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?
(Multiple Choice)
4.8/5
(39)
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?
(Multiple Choice)
4.8/5
(35)
A framework for all of the entities involved in digital certificates for digital certificate management is known as:
(Multiple Choice)
4.8/5
(34)
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?
(Multiple Choice)
4.8/5
(40)
A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.
(Short Answer)
4.8/5
(27)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)