Filters
Question type

The encapsulating security ____________________ protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

Correct Answer

verifed

verified

An X.509 v3 certificate binds a ___________, which uniquely identifies a certificate entity, to a user's public key.


A) message digest
B) fingerprint
C) distinguished name
D) digital signature

Correct Answer

verifed

verified

A mathematical ____________________ is a secret mechanism that enables you to easily accomplish the reverse function in a one-way function.

Correct Answer

verifed

verified

__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.


A) Code
B) An algorithm
C) A key
D) Work factor

Correct Answer

verifed

verified

The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management.

Correct Answer

verifed

verified

UltraViolet wireless (UVW) is a de facto industry standard for short-range wireless communications between devices. _________________________

Correct Answer

verifed

verified

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

Correct Answer

verifed

verified

As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. _________________________

Correct Answer

verifed

verified

False - Triple

__________ is a protocol that can be used to secure communications across any IP-based network such as LANs, WANs, and the Internet.


A) PEM
B) SSH
C) IPSec
D) SET

Correct Answer

verifed

verified

Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.

Correct Answer

verifed

verified

Asymmetric encryption systems use a single key to both encrypt and decrypt a message.

Correct Answer

verifed

verified

Describe digital certificates.

Correct Answer

verifed

verified

Digital certificates are public-key cont...

View Answer

To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.

Correct Answer

verifed

verified

False

Hashing functions require the use of keys.

Correct Answer

verifed

verified

Hash algorithms are public functions that create a message digest by converting variable-length messages into a single fixed-length value. _________________________

Correct Answer

verifed

verified

In IPSec ____________________ mode, only the IP data is encrypted, not the IP headers.

Correct Answer

verifed

verified

_________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.


A) PGP
B) DES
C) AH
D) ESP

Correct Answer

verifed

verified

Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.

Correct Answer

verifed

verified

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.

Correct Answer

verifed

verified

True

__________ is the entire range of values that can possibly be used to construct an individual key.


A) Code
B) Keyspace
C) An algorithm
D) A cryptogram

Correct Answer

verifed

verified

Showing 1 - 20 of 109

Related Exams

Show Answer