Exam 22: Internet Security Protocols and Standards

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The most complex part of SSL is the __________.

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

D

DKIM is designed to provide an e-mail authentication technique that is transparent to the end user.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

True

In S/MIME each conventional key is used a total of three times.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

False

The SSL record protocol provides two services for SSL connection: message integrity and _________.

(Short Answer)
4.8/5
(35)

The IAB included authentication and encryption as necessary security features in IPv6.

(True/False)
4.8/5
(45)

A benefit of IPsec is __________.

(Multiple Choice)
4.8/5
(37)

The _________ is used to convey SSL-related alerts to the peer entity.

(Short Answer)
4.8/5
(27)

At its most fundamental level the Internet mail architecture consists of a user world in the form of _________.

(Multiple Choice)
4.8/5
(27)

A security association is uniquely identified by three parameters: security parameter index,protocol identifier,and ________________.

(Short Answer)
4.8/5
(27)

The recipient of a message can decrypt the signature using DSS and the sender's public DSS key.

(True/False)
4.8/5
(38)

IP-level security encompasses three functional areas: authentication,confidentiality,and _________.

(Short Answer)
4.8/5
(30)

IPsec provides two main functions: a combined authentication/encryption function called ___________ and a key exchange function.

(Short Answer)
4.7/5
(46)

Most browsers come equipped with SSL and most Web servers have implemented the protocol.

(True/False)
4.7/5
(26)

Search engines support HTTPS.

(True/False)
4.8/5
(28)

MIME provides the ability to sign and/or encrypt e-mail messages.

(True/False)
4.8/5
(38)

To protect the data,either the signature alone or the signature plus the message are mapped into printable ASCII characters using a scheme known as ________ or base64mapping.

(Multiple Choice)
4.8/5
(37)

The _______ field in the outer IP header indicates whether the association is an AH or ESP security association.

(Multiple Choice)
4.9/5
(39)

The ________ is housed in the user's computer and is referred to as a client e-mail program or a local network e-mail server.

(Short Answer)
4.8/5
(36)

The ______ is responsible for transferring the message from the MHS to the MS.

(Multiple Choice)
4.7/5
(38)

The ________ function consists of encrypted content of any type and encrypted-content encryption keys for one or more recipients.

(Multiple Choice)
4.7/5
(30)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)