Filters
Question type

Study Flashcards

The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.​

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by trusted third party.​


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

Correct Answer

verifed

verified

Explain how digital certificates are managed.

Correct Answer

verifed

verified

Several entities and technologies are us...

View Answer

Match the following terms to the appropriate definitions. -​Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

Correct Answer

verifed

verified

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?​


A) ​TLS 3.0
B) ​IPSec
C) GPG
D) ​SSL

Correct Answer

verifed

verified

Why is IPsec considered to be a transparent security protocol?​


A) ​IPsec packets can be viewed by anyone
B) ​IPsec is designed to not require modifications of programs, or additional training, or additional client setup
C) ​IPsec's design and packet header contents are open sourced technologies
D) ​IPsec uses the Transparent Encryption (TE) algorithm

Correct Answer

verifed

verified

Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature.

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate​


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

Correct Answer

verifed

verified

What cryptographic transport algorithm is considered to be significantly more secure than SSL?


A) AES
B) HTTPS
C) ESSL
D) TLS

Correct Answer

verifed

verified

List two requirements for verification of an EV SSL.

Correct Answer

verifed

verified

The CA must pass an independent audit ve...

View Answer

Showing 41 - 50 of 50

Related Exams

Show Answer