Networking II - Net133_301

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You work for a company that is implementing symmetric cryptography to process payment applications, such as card transactions, where personally identifiable information (PII) needs to be protected to prevent identity theft or fraudulent charges. Which of the following algorithm types would be best for transmitting large amounts of data?

Block

Kathy doesn't want to purchase a digital certificate from a public certificate authority, but needs to establish a PKI in her local network. Which of the follow actions should she take?

Create a local CA and generate a self-signed certificate.

Robert, an IT administrator, is working for a newly formed company. He needs a digital certificate to send and receive data securely in a Public Key Infrastructure (PKI). Which of the following requests should he submit?

He must send identifying data with his certificate request to a registration authority (RA).

Which of the follow is a characteristic of Elliptic Curve Cryptography (ECC)?

Is suitable for small amounts of data and small devices, such as smartphones.

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which of the following cryptographic keys would Mary use to create the digital signature?

Mary's private key

Above all else, which of the following must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Bob encrypts a message using a key and sends it to Alice. Alice decrypts the message using the same key. Which of the following types of encryption keys is being used?

Symmetric

Which of the following best describes a feature of symmetric encryption?

Uses only one key to encrypt and decrypt data.

Which of the following is a characteristic of the Advanced Encryption Standard (AES) symmetric block cipher?

Uses the Rijndael block cipher.

Which of the following terms is the encrypted form of a message that is unreadable except to its intended recipient?

ciphertext


Ensembles d'études connexes

RN Concept-Based Assessment Level 2 Online Practice B

View Set

NUTR Exam #1 Digestion and Absorption

View Set

virtual - fundamentals - basic care and comfort quiz

View Set

The Characteristics of Nonverbal Communication

View Set

ch 6: childhood- socioemotional dev.

View Set

NURS 2207- Oncology Evolve EAQ (Graded)

View Set

Unit 1: Points, Lines and Planes Vocabulary

View Set

Economics: Chapter 10 Pure Competition

View Set