3.6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The PGP or Pretty Good Privacy encryption utility relies upon what algorithms? (Select two.) AES 3DES Blowfish IDEA

3DES IDEA

What is the primary use of Secure Electronic Transaction (SET)? Validate the integrity of database changes Secure electronic checking account transactions Encrypt ecommerce traffic Protect credit card information transmissions

Protect credit card information transmissions

Which public key encryption system does PGP (Pretty Good Privacy) use for key exchange and digital signatures? Elliptic Curve El Gamal MerkleHellman Knapsack RSA

RSA

Which security mechanism can be used to harden or protect ecommerce traffic from Web servers? Removing unneeded protocols Penetration testing Access control lists SSL

SSL

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) can be used to provide security for what type of traffic? Telnet FTP Email Web

Web HTTPS uses a 40bit key for the RC4 stream encryption algorithm

What form of cryptography is scalable for use in very large and ever expanding environments where data is frequently exchanged between different communication partners? Asymmetric cryptography Private key cryptography Symmetric cryptography Hashing cryptography

Asymmetric cryptography

Which of the following statements is true when comparing symmetric and asymmetric cryptography? Symmetric key cryptography uses a public and private key pair. Asymmetric key cryptography is used to distribute symmetric keys. Symmetric key cryptography should be used for large, expanding environments. Asymmetric key cryptography is quicker than symmetric key cryptography while processing large amounts of data

Asymmetric key cryptography is used to distribute symmetric keys. called hybrid cryptography system

Which of the following is a direct protection of integrity? Digital signature Asymmetric encryption Symmetric encryption Digital envelope

Digital signature

Secure MultiPurpose Internet Mail Extensions (S/MIME) is used primarily to protect what? Instant messages Newsgroup postings Email attachments Web surfing

Email attachments

What is the main function of a TPM hardware chip? Provide authentication credentials on a hardware device Perform bulk encryption in a hardware processor Generate and store cryptographic keys Control access to removable media

Generate and store cryptographic keys A Trusted Platform Module (TPM) is a hardware cryptoprocessor that resides on the motherboard that stores and generates cryptographic keys.

Which of the following can be used to encrypt Web, email, telnet, file transfer, and SNMP traffic? IPSec (Internet Protocol Security) SSL (Secure Sockets Layer) SHTTP (Secure Hypertext Transfer Protocol) EFS (Encryption File System)

IPSec (Internet Protocol Security)

What form of cryptography is not scalable as a standalone system for use in very large and ever expanding environments where data is frequently exchanged between different communication partners? Hashing cryptography Asymmetric cryptography Symmetric cryptography Public key cryptography

Symmetric cryptography

Which of the following communications encryption mechanisms has a specific version for wireless communications? IPSec (Internet Protocol Security) TLS (Transport Layer Security) SSL (Secure Sockets Layer) HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)

TLS (Transport Layer Security)

Which of the following technologies is based upon SSL (Secure Sockets Layer)? IPSec (Internet Protocol Security) L2TP (Layer 2 Tunneling Protocol) TLS (Transport Layer Security) S/MIME (Secure Multipurpose Internet Mail Extensions)

TLS (Transport Layer Security) TLS (Transport Layer Security) operates over TCP port 443 or port 80.

Which of the following is not true in regards to S/MIME? Authenticates through digital signatures Uses IDEA encryption Included in most Web browsers Uses X.509 version 3 certificates

Uses IDEA encryption (uses RSA (not IDEA) encryption)

A _______ _________ is a direct protection of integrity as it includes the use of hashing which detects changes to integrity.

digital signature


संबंधित स्टडी सेट्स

Intro to Economics - quiz 1 (multiple choice)

View Set

Intro to American Politics Final

View Set

public speaking midterm study guide

View Set

MKTG 4280 Ch. 9 McGraw-Hill Connect

View Set

biology--chapter 3 organelle terms

View Set

CHH. 41: A Team Approach to Healthcare

View Set

Словарь терминов по истории России, необходимых для выполнения заданий ЕГЭ

View Set