3.6
The PGP or Pretty Good Privacy encryption utility relies upon what algorithms? (Select two.) AES 3DES Blowfish IDEA
3DES IDEA
What is the primary use of Secure Electronic Transaction (SET)? Validate the integrity of database changes Secure electronic checking account transactions Encrypt ecommerce traffic Protect credit card information transmissions
Protect credit card information transmissions
Which public key encryption system does PGP (Pretty Good Privacy) use for key exchange and digital signatures? Elliptic Curve El Gamal MerkleHellman Knapsack RSA
RSA
Which security mechanism can be used to harden or protect ecommerce traffic from Web servers? Removing unneeded protocols Penetration testing Access control lists SSL
SSL
HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) can be used to provide security for what type of traffic? Telnet FTP Email Web
Web HTTPS uses a 40bit key for the RC4 stream encryption algorithm
What form of cryptography is scalable for use in very large and ever expanding environments where data is frequently exchanged between different communication partners? Asymmetric cryptography Private key cryptography Symmetric cryptography Hashing cryptography
Asymmetric cryptography
Which of the following statements is true when comparing symmetric and asymmetric cryptography? Symmetric key cryptography uses a public and private key pair. Asymmetric key cryptography is used to distribute symmetric keys. Symmetric key cryptography should be used for large, expanding environments. Asymmetric key cryptography is quicker than symmetric key cryptography while processing large amounts of data
Asymmetric key cryptography is used to distribute symmetric keys. called hybrid cryptography system
Which of the following is a direct protection of integrity? Digital signature Asymmetric encryption Symmetric encryption Digital envelope
Digital signature
Secure MultiPurpose Internet Mail Extensions (S/MIME) is used primarily to protect what? Instant messages Newsgroup postings Email attachments Web surfing
Email attachments
What is the main function of a TPM hardware chip? Provide authentication credentials on a hardware device Perform bulk encryption in a hardware processor Generate and store cryptographic keys Control access to removable media
Generate and store cryptographic keys A Trusted Platform Module (TPM) is a hardware cryptoprocessor that resides on the motherboard that stores and generates cryptographic keys.
Which of the following can be used to encrypt Web, email, telnet, file transfer, and SNMP traffic? IPSec (Internet Protocol Security) SSL (Secure Sockets Layer) SHTTP (Secure Hypertext Transfer Protocol) EFS (Encryption File System)
IPSec (Internet Protocol Security)
What form of cryptography is not scalable as a standalone system for use in very large and ever expanding environments where data is frequently exchanged between different communication partners? Hashing cryptography Asymmetric cryptography Symmetric cryptography Public key cryptography
Symmetric cryptography
Which of the following communications encryption mechanisms has a specific version for wireless communications? IPSec (Internet Protocol Security) TLS (Transport Layer Security) SSL (Secure Sockets Layer) HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)
TLS (Transport Layer Security)
Which of the following technologies is based upon SSL (Secure Sockets Layer)? IPSec (Internet Protocol Security) L2TP (Layer 2 Tunneling Protocol) TLS (Transport Layer Security) S/MIME (Secure Multipurpose Internet Mail Extensions)
TLS (Transport Layer Security) TLS (Transport Layer Security) operates over TCP port 443 or port 80.
Which of the following is not true in regards to S/MIME? Authenticates through digital signatures Uses IDEA encryption Included in most Web browsers Uses X.509 version 3 certificates
Uses IDEA encryption (uses RSA (not IDEA) encryption)
A _______ _________ is a direct protection of integrity as it includes the use of hashing which detects changes to integrity.
digital signature