A) it uses asymmetric encryption
B) the key is sent to the receiver securely
C) is uses PKI and certificates
D) it uses a private and public key
Correct Answer
verified
Multiple Choice
A) AES
B) block cipher
C) ciphertext
D) cryptanalysis
E) DES
F) XOR function
G) IPsec
H) key management
I) plaintext
J) stream cipher
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) SSH
B) SSL
C) TLS
D) IPsec
Correct Answer
verified
Multiple Choice
A) registration authority
B) CRL
C) pseudorandom number generator
D) hashing function
Correct Answer
verified
Multiple Choice
A) a message digest of Mike's message is calculated using a hashing algorithm
B) Sophie compares the message digest she calculated to Mikes's message
C) Sophie encrypts Mike's message with Mike's public key
D) the message digest is encrypted by Mike's private key
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) IKE
B) ISAKMP
C) Oakley
D) IPsec driver
Correct Answer
verified
Multiple Choice
A) confidentiality
B) scalability
C) authentication
D) nonrepudiation
Correct Answer
verified
Multiple Choice
A) Twofish
B) RC4
C) Blowfish
D) Rijndael
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) they are not completely random
B) their state is measured in bytes
C) the shorter the state, the longer the period
D) they can never produce the same value
Correct Answer
verified
Multiple Choice
A) AES
B) block cipher
C) ciphertext
D) cryptanalysis
E) DES
F) XOR function
G) IPsec
H) key management
I) plaintext
J) stream cipher
Correct Answer
verified
Multiple Choice
A) AES
B) block cipher
C) ciphertext
D) cryptanalysis
E) DES
F) XOR function
G) IPsec
H) key management
I) plaintext
J) stream cipher
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) a published listing of invalid certificates
B) serve as a front end to users for revoking certificates
C) a file that contains information about the user and public key
D) keeps track of issued credentials and manages revocation of certificates
Correct Answer
verified
Multiple Choice
A) RSA
B) Message Digest 5
C) RC4
D) Twofish
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 50
Related Exams