Network Security 1.0 Modules 15-17

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are two symmectric encryption algorithms?

3DES AES

What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

AES

Which three security services are provided by digital signatures? (Choose three)

Guarantees data has not changed in transit Provides data encryption Authenticates the source

An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. IN which two cases might an organization use PKI applications to securely exchange information between users?

HTTPS web service 802.1x authentication

What technology supports asymmectric key encryption used in IPsec VPNs?

IKE

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?

Integrity

What is the purpose of digital certificate?

It authenticates a website and establishes a secure connection to exchange confidential data.

Which algorithm can ensure data integrity?

MD5

A company is developing a security policy for secure communication. In the exchange of critical

Origin authentication

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

PKI certificates

What is another name for confidentiality of information?

Privacy

Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?

Private key from Alice

What is an example of the one-time pad cipher?

RC4

What are two properties of a cryptographic hash function? (Choose two)

The hash function is one way and irreversible The output is a fixed length

Which statement describes asymmetric encryption algorithms?

They are relatively slow because they are based on difficult computational algorithms.

Which two items are used in asymmectric encryption? (Choose two)

a private key a public key

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

The following message was encrypted using a Ceasar cipher with a key of 2: fghgpf vjg ecuvng

defend the castle

In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?

from the root CA or another subordinate CA at a higher level

In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding cipthertext?

meet-in-the-middle

What is the keyspace of an encryption algorithm?

the set of all possible values used to generate a key

What is the purpose for the using digital signatures for code signing?

to verify the integrity of executable files downloaded from a vendor website


Conjuntos de estudio relacionados

Social Psych Final Multiple Choice

View Set

Hooke's law and Elastic Potential Energy

View Set

Micro Chapter 2: The Market System and the Circular Flow

View Set

Microeconomics Test 1 (Chapters 1-3)

View Set

Chapter 28 - Pulling it All Together : Integrated Head-to-Toe Assessment

View Set