Exam 14: Key Management and Distribution

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Some sort of mechanism or protocol is needed to provide for the secure distribution of keys.

(True/False)
4.8/5
(38)

A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.

(Essay)
4.8/5
(30)

A random number would not be a good choice for a nonce.

(True/False)
4.8/5
(35)

Each user must share a unique key with the key distribution center for purposes of key distribution.

(True/False)
4.8/5
(37)

Although public announcement of public keys is convenient, anyone can forge a public announcement.

(True/False)
4.7/5
(37)

For symmetric encryption to work the two parties to an exchange must share the same key and that key must be protected from access by others.

(True/False)
4.7/5
(35)

X.509 is an important standard because the certificate structure and authentication protocols defined in X.509 are used in a variety of contexts.

(True/False)
4.8/5
(45)

If A and B each has an encrypted connection to a third party C,C can deliver a key on the encrypted links to A and B.A _________ center is responsible for distributing keys to pairs of users as needed.

(Essay)
4.8/5
(27)

__________ indicates a restriction imposed as to the purposes for which,and the policies under which,the certified public key may be used.

(Multiple Choice)
4.8/5
(32)

The directory entry for each certification authority includes two types of certificates: forward certificates and ___________ .

(Essay)
4.8/5
(35)

With the __________ scheme,if an adversary succeeds in obtaining or computing the private key of the directory authority,the adversary could authoritatively pass out counterfeit public keys and subsequently impersonate any participant and eavesdrop on messages sent to any participant.

(Multiple Choice)
4.9/5
(29)

A __________ defines the procedures needed to revoke digital certificates.

(Multiple Choice)
4.9/5
(36)

A public-key certificate scheme alone does not provide the necessary security to authenticate the public key.

(True/False)
4.8/5
(43)

The topics of cryptographic key management and cryptographic key distribution are complex,involving cryptographic,protocol, and management considerations.

(True/False)
4.8/5
(28)

Communication between end systems is encrypted using a _________ key.

(Multiple Choice)
4.7/5
(26)

Key distribution often involves the use of __________ which are infrequently used and are long lasting.

(Multiple Choice)
4.7/5
(26)

If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.

(Essay)
4.8/5
(37)

Master keys can be distributed in some noncryptographic way such as physical delivery.

(True/False)
4.8/5
(36)

The strength of any cryptographic system rests with the ___________ .

(Multiple Choice)
4.9/5
(42)

__________ is the function that delivers a key to two parties who wish to exchange secure encrypted data.

(Essay)
4.8/5
(29)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)