Filters
Question type

A ________connects a single client over an untrusted network to a single server.


A) host-to-host VPN
B) remote access VPN
C) one-time key
D) site-to-site VPN

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

IPsec transport mode gives host-to-host security.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is efficient in regard to processing power and RAM requirements to be used on many different types of devices?


A) 3DES
B) DES
C) Triple DES
D) AES

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

All browsers are SSL/TLS-aware.

A) True
B) False

Correct Answer

verifed

verified

A remote access VPN connect a single remote PC over an untrusted network to a site network.

A) True
B) False

Correct Answer

verifed

verified

________ is 56 bits long.


A) The DES key
B) An RSA key
C) A symmetric key
D) A hash

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A(n) ________ occurs when an attacker intercepts an encrypted message and transmits it again later.


A) replay attack
B) security through obscurity attack
C) evil twin attack
D) man-in-the-middle attack

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________ is an independent and trusted source of information about public keys of true parties.


A) A message digest
B) Verification
C) A digital signature
D) A certificate authority

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Auguste Kerckhoffs proved that as long as the ________, the two parties will still have confidentiality.


A) both the key and the cipher code are kept secret
B) the key is made available and the cipher is kept secret
C) the key is kept secret
D) the cipher is kept secret

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The use of public key encryption to do keying is widespread.

A) True
B) False

Correct Answer

verifed

verified

________ can deliver very long keys to communication partners.


A) Diffie-Hellman key exchange
B) Public key encryption
C) One-time key exchange
D) Quantum key distribution

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

In transposition ciphers, letters are changed but their position is not.

A) True
B) False

Correct Answer

verifed

verified

IPsec operates at the ________ layer.


A) application
B) transport
C) internet
D) secure sockets

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

There are no SSL/TLS gateway standards.

A) True
B) False

Correct Answer

verifed

verified

Quantum key distribution creates a one-time key.

A) True
B) False

Correct Answer

verifed

verified

A key is a random strong of 40 to 4,000 bits.

A) True
B) False

Correct Answer

verifed

verified

Digital signatures are used much more often than are HMACs.

A) True
B) False

Correct Answer

verifed

verified

Which are the two widely used public key encryption ciphers?


A) RSA and ECC
B) ECC and DES
C) RSA and AES
D) DES and 3DES

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

There are three handshaking stages when two parties communicate through a cryptographic system standard.

A) True
B) False

Correct Answer

verifed

verified

A cipher is a general way to encrypt information, while codes are limited.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 101

Related Exams

Show Answer