Filters
Question type

Nonrepudiation means that a sender cannot deny that he or she sent an important message.

A) True
B) False

Correct Answer

verifed

verified

IPsec is considered the gold standard in VPN security.

A) True
B) False

Correct Answer

verifed

verified

A cryptanalyst is someone who cracks encryption.

A) True
B) False

Correct Answer

verifed

verified

Public key encryption and symmetric key encryption are complementary.

A) True
B) False

Correct Answer

verifed

verified

Almost all computer information is encoded as a set of bytes and characters.

A) True
B) False

Correct Answer

verifed

verified

When ________ is applied to a binary message, the results is far shorter than the original message.


A) hashing
B) credentialing
C) verifying
D) keying

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

________ uses a key exchanged during the initial negotiation phase.


A) A DES
B) The HMAC
C) A hash
D) A message digest

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Public key encryption to do keying is extremely vast.

A) True
B) False

Correct Answer

verifed

verified

If a send is the true party, the sender will be authenticated.

A) True
B) False

Correct Answer

verifed

verified

Cryptographic systems are nearly always used over trusted networks.

A) True
B) False

Correct Answer

verifed

verified

________ is a cryptographic process that changes plaintext into a seemingly random stream of bits.


A) Encryption
B) Brute-force key cracking
C) Cryptography
D) Ciphertext

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What does a client need to have to use SSL/TLS?


A) For basic operation, it needs additional software.
B) For all operations, it needs additional software.
C) For basic operation, it needs encryption software.
D) For all activities and all messages, it must have sophisticated software.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

IPsec tunnel mode only protects traffic between two IPsec gateways at the same site.

A) True
B) False

Correct Answer

verifed

verified

SSL/TLS is able to create site-to-site VPNs.

A) True
B) False

Correct Answer

verifed

verified

A cipher suite includes all of the following EXCEPT ________.


A) a specific set of methods and options for initial authentication
B) a key exchange
C) ongoing message confidentiality, authentication, and integrity
D) an encrypted message and an electronic signature

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Message-by-message authentication thwarts efforts by impostors to insert messages into a dialogue stream.

A) True
B) False

Correct Answer

verifed

verified

There is wide variation in the strengths of SSL/TLS cipher suites.

A) True
B) False

Correct Answer

verifed

verified

A ________ is the person a supplicant claims to be.


A) verifier
B) public key
C) true party
D) digital signature

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

A cryptographic system is ________.


A) a system where letters are moved around within a message, based on their initial positions in the message
B) a packaged set of cryptographic countermeasures for protecting dialogues
C) a specific set of options in SSL/TLS
D) when both parties authenticate themselves

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ________ is simply a webserver as far as SSL/TLS is concerned.


A) SSL/TLS key
B) SSL/TLS gateway
C) DES/3DES
D) encryption

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 101

Related Exams

Show Answer