Exam 19: Electronic Mail Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

Secure/Multipurpose Internet Mail Extension S/MIME)

A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer,which is then encoded using base64 encoding.

Free
(Essay)
4.8/5
(26)
Correct Answer:
Verified

digital signature

PGP provides compression using the __________ algorithm.

Free
(Essay)
4.9/5
(32)
Correct Answer:
Verified

ZIP

PGP provides e-mail compatibility using the __________ encoding scheme.

(Multiple Choice)
4.7/5
(25)

The __________ subtype is used when the different parts are independent but are to be transmitted together.They should be presented to the receiver in the order that they appear in the mail message.

(Multiple Choice)
4.8/5
(31)

To provide transparency for e-mail applications,an encrypted message may be converted to an ASCII string using _________ conversion.

(Essay)
4.9/5
(36)

The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication.

(Multiple Choice)
4.7/5
(35)

To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.

(True/False)
4.7/5
(43)

The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.

(Essay)
4.9/5
(34)

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.

(True/False)
4.8/5
(23)

PGP makes use of four types of keys: public keys,private keys,one-time session keys,and ___________ symmetric keys.

(Essay)
4.8/5
(30)

The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.

(Essay)
4.9/5
(35)

PGP has a very rigid public-key management scheme.

(True/False)
4.9/5
(38)

Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.

(Multiple Choice)
4.9/5
(36)

The key legitimacy field,the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .

(Essay)
4.8/5
(37)

The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards.

(Multiple Choice)
4.9/5
(32)

PGP incorporates tools for developing public-key certificate management and a public-key trust model.

(True/False)
4.8/5
(37)

The _________ type refers to other kinds of data,typically either uninterpreted binary data or information to be processed by a mail-based application.

(Essay)
4.7/5
(26)

A message component includes the actual data to be stored or transmitted as well as a filename and a timestamp that specifies the time of creation.

(True/False)
5.0/5
(34)

The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.

(Essay)
4.9/5
(43)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)