Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) hashing
B) credentialing
C) verifying
D) keying
Correct Answer
verified
Multiple Choice
A) A DES
B) The HMAC
C) A hash
D) A message digest
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Encryption
B) Brute-force key cracking
C) Cryptography
D) Ciphertext
Correct Answer
verified
Multiple Choice
A) For basic operation, it needs additional software.
B) For all operations, it needs additional software.
C) For basic operation, it needs encryption software.
D) For all activities and all messages, it must have sophisticated software.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a specific set of methods and options for initial authentication
B) a key exchange
C) ongoing message confidentiality, authentication, and integrity
D) an encrypted message and an electronic signature
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) verifier
B) public key
C) true party
D) digital signature
Correct Answer
verified
Multiple Choice
A) a system where letters are moved around within a message, based on their initial positions in the message
B) a packaged set of cryptographic countermeasures for protecting dialogues
C) a specific set of options in SSL/TLS
D) when both parties authenticate themselves
Correct Answer
verified
Multiple Choice
A) SSL/TLS key
B) SSL/TLS gateway
C) DES/3DES
D) encryption
Correct Answer
verified
Showing 81 - 100 of 101
Related Exams