Exam 19: Electronic Mail Security
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.
Free
(Essay)
4.8/5
(31)
Correct Answer:
Secure/Multipurpose Internet Mail Extension S/MIME)
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer,which is then encoded using base64 encoding.
Free
(Essay)
4.8/5
(26)
Correct Answer:
digital signature
PGP provides compression using the __________ algorithm.
Free
(Essay)
4.9/5
(32)
Correct Answer:
ZIP
PGP provides e-mail compatibility using the __________ encoding scheme.
(Multiple Choice)
4.7/5
(25)
The __________ subtype is used when the different parts are independent but are to be transmitted together.They should be presented to the receiver in the order that they appear in the mail message.
(Multiple Choice)
4.8/5
(31)
To provide transparency for e-mail applications,an encrypted message may be converted to an ASCII string using _________ conversion.
(Essay)
4.9/5
(36)
The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication.
(Multiple Choice)
4.7/5
(35)
To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.
(True/False)
4.7/5
(43)
The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.
(Essay)
4.9/5
(34)
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
(True/False)
4.8/5
(23)
PGP makes use of four types of keys: public keys,private keys,one-time session keys,and ___________ symmetric keys.
(Essay)
4.8/5
(30)
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.
(Essay)
4.9/5
(35)
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.
(Multiple Choice)
4.9/5
(36)
The key legitimacy field,the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .
(Essay)
4.8/5
(37)
The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards.
(Multiple Choice)
4.9/5
(32)
PGP incorporates tools for developing public-key certificate management and a public-key trust model.
(True/False)
4.8/5
(37)
The _________ type refers to other kinds of data,typically either uninterpreted binary data or information to be processed by a mail-based application.
(Essay)
4.7/5
(26)
A message component includes the actual data to be stored or transmitted as well as a filename and a timestamp that specifies the time of creation.
(True/False)
5.0/5
(34)
The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
(Essay)
4.9/5
(43)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)