Deck 7: Standards and Protocols

Full screen (f)
exit full mode
Question
What is a certificate?

A)A certificate used to encrypt a message in PKI
B)A method of certifying the strength of an encryption key
C)A digital document that is used to verify the owner's identity
D)A certificate used in changing the key strength in PKI
Use Space or
up arrow
down arrow
to flip the card.
Question
What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability?

A)FES,Federal encryption standards
B)FIPS,Federal Information Processing Standards
C)FIRE,Federal information regulation enterprise
D)FIES,Federal information and encryption standards
Question
What is IPsec?

A)A collection of IP security features designed to introduce security at the network or packet-processing layer
B)An application that encrypts e-mail
C)A standard setting group that dictates internet security standards
D)The company to first introduce the concept of encryption
Question
WEP has all of the following weaknesses of EXCEPT:

A)The secret key is only 40 bits long.
B)It is susceptible to collision attacks.
C)Even the 128 bit version is vulnerable.
D)Many wireless implementations do not come with WEP enabled.
Question
What is the ISO 17799?

A)A standard for creating and implementing security policies
B)A standard for international encryption of e-mail
C)A document used to develop physical security for a building
D)A document describing the details of wireless encryption
Question
What is CMP?

A)This protocol defines the messages and operations required to provide certificate management services
B)An encryption protocol used to verify a key length
C)An application that decrypts encrypted e-mail
D)A common message protocol that is used in e-mail
Question
What is XKMS?

A)Key Management Specification,which defines services to manage PKI operations within the Extensible Markup Language (XML)environment
B)An XML standard for e-mail encryption
C)A XML standard that used for wireless data exchange
D)A primary XML standard that is for application development
Question
Pretty good privacy (or PGP)is

A)A privacy group that fights against the government
B)A common encryption method for e-mail
C)A password management system
D)A method of security an operating system kernel
Question
For products evaluated by Common Criteria,the highest level of assurance is

A)EAL 1
B)EAL 8
C)EAL 7
D)EAL 9
Question
Certificates that should no longer be used due to compromise should be

A)Deleted
B)Moved to a different computer
C)Revoked
D)Removed
Question
HTTPS uses port

A)80
B)8080
C)443
D)433
Question
What function does Tier 1of the XML protocol service,based on the client requests and application requirements,perform?

A)It locates the appropriate key information for the client
B)Performs a data validation on a portion of the key
C)Automatically updates the firewall installed on the user's computer
D)Updates the cryptographic algorithms for the S/MIME
Question
PGP uses

A)Private key encryption
B)Asymmetric encryption
C)Symmetric encryption
D)Anomalous encryption
Question
What are the SSL and TLS used for?

A)A means of securing application programs on the system
B)To secure communication over the internet
C)A method to change from one form of PKI infrastructure to another
D)A secure way to reduce the amount of SPAM a system receives
Question
Which is the strongest implementation class of WTLS?

A)First class
B)Class 1
C)Class 2
D)Class 3
Question
What is Internet Security Association and Key Management ISAKMP?

A)A method for implementing a key exchange protocol and for negotiating a security policy
B)The name of the a organization that creates the encryption keys
C)A protocol to encrypt e-mail
D)A program that creates random numbers used in encryption keys
Question
What is Wired Equivalent Privacy (WEP)?

A)A method that is used to encrypt wireless communications in an 802.11 environment
B)A signal that jams other wireless devices attempting to access the system
C)A method to change encryption standards during a transmission
D)An encryption method used to secure bank passwords
Question
What is PKCS?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that used a 40 bit encryption key
Question
What is Certificate Authority?

A)A third party that issues digital certificates
B)A auditing firm that ensures encryption security
C)A certified professional that audits systems for security
D)A third party that encrypts information for people
Question
What is PKIX?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that uses a 40 bit encryption key
Question
The current version of S/MIME is version 2.
Question
The Certificate Authority is responsible for issuing,storing,and revoking certificates.
Question
The "S" in HTTPS signifies the protocol used when opening multiple web pages simultaneously.
Question
SSL provides secure connections for web transfers using encryption.
Question
PKI stands for _______________
Question
The _______________ protocol was introduced by Netscape as a means of providing secure connections between the client and server for exchanging information.
Question
The Certificate Management Protocol (CMP)defines the messages and operations required to provide certificate management services within the PKIX model.
Question
_______________ specifies the standard formats for public key certificates,certificate revocation lists,and attribute certificates.
Question
_______________ is composed of two parts: the TLS Record Protocol and the TLS Handshake protocol.
Question
_______________ provides a method for implementing a key exchange protocol and for negotiating a security policy.
Question
IPsec is short for the "second" version of IP.
Question
PKI stands for private key infrastructure.
Question
_______________ allows the encapsulation of one packet inside another to hide the original packet.
Question
The X.905 standard specifies formats for public key certificates.
Question
_______________ defines standards for interactions and operations for four component types: the user,certificate authority,registration authority,and the repository for certificates.
Question
_______________ is used to encrypt web traffic and uses port 443.
Question
A popular program used to encrypt and decrypt e-mail and files is _______________.
Question
_______________ is a message specification extension to the MIME standard,used to provide a way to send and receive signed and encrypted MIME data.
Question
PGP uses private key encryption for encrypting and decrypting e-mail.
Question
WEP uses public key encryption so it has secure wireless communications.
Question
How does PGP work?
Question
WEP is sometimes used to secure a wireless connection.What are the security issues related to WEP?
Question
List and define 5 of the 12 sections detailed by the ISO/IEC 27002 Standard.
Question
Briefly describe a public key infrastructure (PKI).
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Standards and Protocols
1
What is a certificate?

A)A certificate used to encrypt a message in PKI
B)A method of certifying the strength of an encryption key
C)A digital document that is used to verify the owner's identity
D)A certificate used in changing the key strength in PKI
C
2
What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability?

A)FES,Federal encryption standards
B)FIPS,Federal Information Processing Standards
C)FIRE,Federal information regulation enterprise
D)FIES,Federal information and encryption standards
B
3
What is IPsec?

A)A collection of IP security features designed to introduce security at the network or packet-processing layer
B)An application that encrypts e-mail
C)A standard setting group that dictates internet security standards
D)The company to first introduce the concept of encryption
A
4
WEP has all of the following weaknesses of EXCEPT:

A)The secret key is only 40 bits long.
B)It is susceptible to collision attacks.
C)Even the 128 bit version is vulnerable.
D)Many wireless implementations do not come with WEP enabled.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
What is the ISO 17799?

A)A standard for creating and implementing security policies
B)A standard for international encryption of e-mail
C)A document used to develop physical security for a building
D)A document describing the details of wireless encryption
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
What is CMP?

A)This protocol defines the messages and operations required to provide certificate management services
B)An encryption protocol used to verify a key length
C)An application that decrypts encrypted e-mail
D)A common message protocol that is used in e-mail
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
What is XKMS?

A)Key Management Specification,which defines services to manage PKI operations within the Extensible Markup Language (XML)environment
B)An XML standard for e-mail encryption
C)A XML standard that used for wireless data exchange
D)A primary XML standard that is for application development
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
Pretty good privacy (or PGP)is

A)A privacy group that fights against the government
B)A common encryption method for e-mail
C)A password management system
D)A method of security an operating system kernel
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
For products evaluated by Common Criteria,the highest level of assurance is

A)EAL 1
B)EAL 8
C)EAL 7
D)EAL 9
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
Certificates that should no longer be used due to compromise should be

A)Deleted
B)Moved to a different computer
C)Revoked
D)Removed
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
HTTPS uses port

A)80
B)8080
C)443
D)433
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
What function does Tier 1of the XML protocol service,based on the client requests and application requirements,perform?

A)It locates the appropriate key information for the client
B)Performs a data validation on a portion of the key
C)Automatically updates the firewall installed on the user's computer
D)Updates the cryptographic algorithms for the S/MIME
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
PGP uses

A)Private key encryption
B)Asymmetric encryption
C)Symmetric encryption
D)Anomalous encryption
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
What are the SSL and TLS used for?

A)A means of securing application programs on the system
B)To secure communication over the internet
C)A method to change from one form of PKI infrastructure to another
D)A secure way to reduce the amount of SPAM a system receives
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
Which is the strongest implementation class of WTLS?

A)First class
B)Class 1
C)Class 2
D)Class 3
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
What is Internet Security Association and Key Management ISAKMP?

A)A method for implementing a key exchange protocol and for negotiating a security policy
B)The name of the a organization that creates the encryption keys
C)A protocol to encrypt e-mail
D)A program that creates random numbers used in encryption keys
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
What is Wired Equivalent Privacy (WEP)?

A)A method that is used to encrypt wireless communications in an 802.11 environment
B)A signal that jams other wireless devices attempting to access the system
C)A method to change encryption standards during a transmission
D)An encryption method used to secure bank passwords
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
What is PKCS?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that used a 40 bit encryption key
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
What is Certificate Authority?

A)A third party that issues digital certificates
B)A auditing firm that ensures encryption security
C)A certified professional that audits systems for security
D)A third party that encrypts information for people
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
What is PKIX?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that uses a 40 bit encryption key
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
The current version of S/MIME is version 2.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
The Certificate Authority is responsible for issuing,storing,and revoking certificates.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
The "S" in HTTPS signifies the protocol used when opening multiple web pages simultaneously.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
SSL provides secure connections for web transfers using encryption.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
PKI stands for _______________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
The _______________ protocol was introduced by Netscape as a means of providing secure connections between the client and server for exchanging information.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
The Certificate Management Protocol (CMP)defines the messages and operations required to provide certificate management services within the PKIX model.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
_______________ specifies the standard formats for public key certificates,certificate revocation lists,and attribute certificates.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
_______________ is composed of two parts: the TLS Record Protocol and the TLS Handshake protocol.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
_______________ provides a method for implementing a key exchange protocol and for negotiating a security policy.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
IPsec is short for the "second" version of IP.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
PKI stands for private key infrastructure.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
_______________ allows the encapsulation of one packet inside another to hide the original packet.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
The X.905 standard specifies formats for public key certificates.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
_______________ defines standards for interactions and operations for four component types: the user,certificate authority,registration authority,and the repository for certificates.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
_______________ is used to encrypt web traffic and uses port 443.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
A popular program used to encrypt and decrypt e-mail and files is _______________.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
_______________ is a message specification extension to the MIME standard,used to provide a way to send and receive signed and encrypted MIME data.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
PGP uses private key encryption for encrypting and decrypting e-mail.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
WEP uses public key encryption so it has secure wireless communications.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
How does PGP work?
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
WEP is sometimes used to secure a wireless connection.What are the security issues related to WEP?
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
List and define 5 of the 12 sections detailed by the ISO/IEC 27002 Standard.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Briefly describe a public key infrastructure (PKI).
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.