Exam 14: Key Management and Distribution
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
Some sort of mechanism or protocol is needed to provide for the secure distribution of keys.
(True/False)
4.8/5
(38)
A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.
(Essay)
4.8/5
(30)
Each user must share a unique key with the key distribution center for purposes of key distribution.
(True/False)
4.8/5
(37)
Although public announcement of public keys is convenient, anyone can forge a public announcement.
(True/False)
4.7/5
(37)
For symmetric encryption to work the two parties to an exchange must share the same key and that key must be protected from access by others.
(True/False)
4.7/5
(35)
X.509 is an important standard because the certificate structure and authentication protocols defined in X.509 are used in a variety of contexts.
(True/False)
4.8/5
(45)
If A and B each has an encrypted connection to a third party C,C can deliver a key on the encrypted links to A and B.A _________ center is responsible for distributing keys to pairs of users as needed.
(Essay)
4.8/5
(27)
__________ indicates a restriction imposed as to the purposes for which,and the policies under which,the certified public key may be used.
(Multiple Choice)
4.8/5
(32)
The directory entry for each certification authority includes two types of certificates: forward certificates and ___________ .
(Essay)
4.8/5
(35)
With the __________ scheme,if an adversary succeeds in obtaining or computing the private key of the directory authority,the adversary could authoritatively pass out counterfeit public keys and subsequently impersonate any participant and eavesdrop on messages sent to any participant.
(Multiple Choice)
4.9/5
(29)
A __________ defines the procedures needed to revoke digital certificates.
(Multiple Choice)
4.9/5
(36)
A public-key certificate scheme alone does not provide the necessary security to authenticate the public key.
(True/False)
4.8/5
(43)
The topics of cryptographic key management and cryptographic key distribution are complex,involving cryptographic,protocol, and management considerations.
(True/False)
4.8/5
(28)
Communication between end systems is encrypted using a _________ key.
(Multiple Choice)
4.7/5
(26)
Key distribution often involves the use of __________ which are infrequently used and are long lasting.
(Multiple Choice)
4.7/5
(26)
If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.
(Essay)
4.8/5
(37)
Master keys can be distributed in some noncryptographic way such as physical delivery.
(True/False)
4.8/5
(36)
The strength of any cryptographic system rests with the ___________ .
(Multiple Choice)
4.9/5
(42)
__________ is the function that delivers a key to two parties who wish to exchange secure encrypted data.
(Essay)
4.8/5
(29)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)