Filters
Question type

Study Flashcards

In cryptographic systems, the negotiation of security methods and options takes place during the ________ handshaking stage.


A) first
B) second
C) third
D) None of the above

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

IPsec tunnel mode ________.


A) provides host-to-host protection
B) is firewall-friendly
C) Both A and B
D) Neither A nor B

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Nonces can be used in ________.


A) all applications
B) client/server applications
C) time-insensitive applications
D) persistent applications

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

MS-CHAP is used for ________ authentication.


A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.

A) True
B) False

Correct Answer

verifed

verified

Proving your identity to a communication partner is ________.


A) validation
B) identification
C) authentication
D) certification

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following fields are contained on a digital certificate?


A) Public key
B) Digital signature
C) Serial number
D) All of the above

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The first task in establishing a cryptographic system is selecting a cryptographic system standard for the dialogue.

A) True
B) False

Correct Answer

verifed

verified

Companies transmit over the wireless LANs because WLANs ________.


A) are inexpensive
B) are secure
C) Both A and B
D) Neither A nor B

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A ________ is a mathematical process used in encryption and decryption.


A) key
B) cipher
C) plaintext
D) coding method

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The most popular public key encryption cipher is ________.


A) AES
B) DES
C) RSA
D) ECC

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Site-to-site VPNs typically decrypt messages when they arrive from the outside.

A) True
B) False

Correct Answer

verifed

verified

The hash size in SHA-1 is 160 bits.

A) True
B) False

Correct Answer

verifed

verified

Most message-by-message authentication methods provide message integrity as a by-products.

A) True
B) False

Correct Answer

verifed

verified

The person the supplicant claims to be is the true party.

A) True
B) False

Correct Answer

verifed

verified

In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.

A) True
B) False

Correct Answer

verifed

verified

Julia encrypts a message to David using public key encryption for confidentiality. After encrypting the message, can Julia decrypt it?

A) True
B) False

Correct Answer

verifed

verified

When you make a purchase over the Internet, your sensitive traffic is almost always protected by ________ VPN transmission.


A) SSL/TLS
B) IPsec
C) Both A and B
D) Neither A nor B

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following layers does IPsec protect?


A) The transport layer
B) The application layer
C) Both of the above
D) Neither of the above

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Packaged sets of cryptographic countermeasures for protecting data transmission are ________.


A) cryptographic standards
B) metacryptographic systems
C) cryptographic systems
D) All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 122

Related Exams

Show Answer