Deck 22: Internet Security Protocols and Standards
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 22: Internet Security Protocols and Standards
1
To protect the data, either the signature alone or the signature plus the message are mapped into printable ASCII characters using a scheme known as ________ or base64mapping.
A) radix-64
B) ASCII-64
C) ESP-64
D) safe mapping
A) radix-64
B) ASCII-64
C) ESP-64
D) safe mapping
A
2
The ________ function consists of encrypted content of any type and encrypted-content encryption keys for one or more recipients.
A) clear-signed data
B) signed data
C) enveloped data
D) signed and enveloped data
A) clear-signed data
B) signed data
C) enveloped data
D) signed and enveloped data
C
3
The recipient of a message can decrypt the signature using DSS and thesender's public DSS key.
True
4
DKIM has been widely adopted by a range of e-mail providers andmany Internet service providers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
An ADMD is an Internet e-mail provider.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Most browsers come equipped with SSL and most Web servers haveimplemented the protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Transport mode provides protection primarily for lower-layerprotocols.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
As an alternative the RSA public-key encryption algorithm can be usedwith either the SHA-1 or the MD5 message digest algorithm for forming signatures.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Recipients without S/MIME capability can view the message content,although they cannot verify the signature.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
A message store cannot be located on the same machine as the MUA.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The IAB included authentication and encryption as necessary securityfeatures in IPv6.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
In the case of ________ only the digital signature is encoded using base64.
A) enveloped data
B) signed and enveloped data
C) signed data
D) clear-signed data
A) enveloped data
B) signed and enveloped data
C) signed data
D) clear-signed data
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
SMTP is used between the message user agent and the mail submissionagent.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
MIME provides the ability to sign and/or encrypt e-mail messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
DKIM is designed to provide an e-mail authentication technique thatis transparent to the end user.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
In S/MIME each conventional key is used a total of three times.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
MIME is an extension to the old RFC 822 specification of an Internetmail format.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Search engines support HTTPS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
_____ defines a number of content formats, which standardize representations for the support of multimedia e-mail.
A) MEM
B) MIME
C) MSC
D) DKIM
A) MEM
B) MIME
C) MSC
D) DKIM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The result of S/MIME encrypting the digest using DSS and the sender's private DSS key is the ________.
A) digital signature
B) envelope
C) digest code
D) mail extension
A) digital signature
B) envelope
C) digest code
D) mail extension
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
_______ is a list that contains the combinations of cryptographic algorithms supported by the client.
A) Compression method
B) Session ID
C) CipherSuite
D) All of the above
A) Compression method
B) Session ID
C) CipherSuite
D) All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
If encryption is used alone, _______ is used to convert the ciphertext to ASCII format.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The basic tool that permits widespread use of S/MIME is ________.
A) the domain key
B) the public-key certificate
C) the MIME security payload
D) radix-64
A) the domain key
B) the public-key certificate
C) the MIME security payload
D) radix-64
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The _______ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
S/MIME content-types support four new functions: enveloped data, __________, clear-signed data, and signed and enveloped data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A benefit of IPsec is __________.
A) that it is below the transport layer and transparent to applications
B) there is no need to revoke keying material when users leave the organization
C) it can provide security for individual users if needed
D) all of the above
A) that it is below the transport layer and transparent to applications
B) there is no need to revoke keying material when users leave the organization
C) it can provide security for individual users if needed
D) all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The default algorithms used for encrypting S/MIME messages are the triple DES and a public-key scheme known as _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The ______ is responsible for transferring the message from the MHS to the MS.
A) MDA
B) MS
C) MUA
D) MSA
A) MDA
B) MS
C) MUA
D) MSA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The ________ accepts the message submitted by a message user agent and enforces the policies of the hosting domain and the requirements of Internet standards.
A) mail submission agent
B) message user agent
C) mail delivery agent
D) message transfer agent
A) mail submission agent
B) message user agent
C) mail delivery agent
D) message transfer agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The _______ field in the outer IP header indicates whether the association is an AH or ESP security association.
A) protocol identifier
B) security parameter index
C) IP destination address
D) sequence path counter
A) protocol identifier
B) security parameter index
C) IP destination address
D) sequence path counter
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The most complex part of TLS is the __________.
A) signature
B) message header
C) payload
D) handshake protocol
A) signature
B) message header
C) payload
D) handshake protocol
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
At its most fundamental level the Internet mail architecture consists of a user world in the form of _________.
A) MHS
B) MSA
C) MUA
D) MDA
A) MHS
B) MSA
C) MUA
D) MDA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
________ is a security enhancement to the MIME Internet e-mail format standard, based on technology from RSA Data Security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
_________ is a specification for cryptographically signing e-mail messages, permitting a signing domain to claim responsibility for a message in the mail stream.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
ESP supports two modes of use: transport and _________.
A) padding
B) tunnel
C) payload
D) sequence
A) padding
B) tunnel
C) payload
D) sequence
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The default algorithms used for signing S/MIME messages are SHA-1 and the _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A signed data message can only be viewed by a recipient with __________ capability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The ________ is housed in the user's computer and is referred to as a client e-mail program or a local network e-mail server.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
IPsec can assure that _________.
A) a router advertisement comes from an authorized router
B) a routing update is not forged
C) a redirect message comes from the router to which the initial packet was sent
D) all of the above
A) a router advertisement comes from an authorized router
B) a routing update is not forged
C) a redirect message comes from the router to which the initial packet was sent
D) all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The _________ is used to convey SSL-related alerts to the peer entity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
IPsec provides two main functions: a combined authentication/encryption function called ___________ and a key exchange function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The SSL record protocol provides two services for SSL connection: message integrity and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A security association is uniquely identified by three parameters: security parameter index, protocol identifier, and ________________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
IP-level security encompasses three functional areas: authentication, confidentiality, and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck