A) host-to-host VPN
B) remote access VPN
C) one-time key
D) site-to-site VPN
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) 3DES
B) DES
C) Triple DES
D) AES
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The DES key
B) An RSA key
C) A symmetric key
D) A hash
Correct Answer
verified
Multiple Choice
A) replay attack
B) security through obscurity attack
C) evil twin attack
D) man-in-the-middle attack
Correct Answer
verified
Multiple Choice
A) A message digest
B) Verification
C) A digital signature
D) A certificate authority
Correct Answer
verified
Multiple Choice
A) both the key and the cipher code are kept secret
B) the key is made available and the cipher is kept secret
C) the key is kept secret
D) the cipher is kept secret
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Diffie-Hellman key exchange
B) Public key encryption
C) One-time key exchange
D) Quantum key distribution
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) application
B) transport
C) internet
D) secure sockets
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) RSA and ECC
B) ECC and DES
C) RSA and AES
D) DES and 3DES
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 101
Related Exams