Ch 4 - Advanced Cryptography

Beschreibung

Ch 4 quiz
C Danvers
Quiz von C Danvers, aktualisiert more than 1 year ago
C Danvers
Erstellt von C Danvers vor etwa 6 Jahre
693
0

Zusammenfassung der Ressource

Frage 1

Frage
A certificate repository (CR) is a publicly accessible centralized directory of digital certificates
Antworten
  • True
  • False

Frage 2

Frage
A digital certificate is a technology used to associate a user's identity to a private key.
Antworten
  • True
  • False

Frage 3

Frage
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?
Antworten
  • Certificate Practice Statement (CPS)
  • Access Policy (AP)
  • Lifecycle Policy (LP)
  • Certificate Policy (CP)

Frage 4

Frage
A framework for all of the entities involved in digital certificates for digital certificate management is known as:
Antworten
  • private key infrastructure
  • network key infrastructure
  • public key infrastructure
  • shared key infrastructure

Frage 5

Frage
A Subject Alternative Name (SAN) digital certificate, is also known as a Unified Communications Certificate (UCC).
Antworten
  • True
  • False

Frage 6

Frage
At what stage can a certificate no longer be used for any type of authentication?
Antworten
  • expiration
  • creation
  • suspension
  • revocation

Frage 7

Frage
A user electronically signs a Certificate Signing Request (CSR) by affixing their public key and then sending it to an intermediate certificate authority.
Antworten
  • True
  • False

Frage 8

Frage
Digital certificates should last forever.
Antworten
  • True
  • False

Frage 9

Frage
Root digital certificates should never be self-signed.
Antworten
  • True
  • False

Frage 10

Frage
Select the secure alternative to the telnet protocol:
Antworten
  • HTTPS
  • IPsec
  • TLS
  • SSH

Frage 11

Frage
Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
Antworten
  • Registration Authority
  • Participation Authority
  • Certification Authority
  • Delegation Authority

Frage 12

Frage
Some CAs issue only entry-level certificates that provide domain-only validation.
Antworten
  • True
  • False

Frage 13

Frage
Some cryptographic algorithms require that in addition to a key another value can or must be input.
Antworten
  • True
  • False

Frage 14

Frage
SSL v3.0 served as the basis for TLS v1.0.
Antworten
  • True
  • False

Frage 15

Frage
Stream ciphers work on multiple characters at a time.
Antworten
  • True
  • False

Frage 16

Frage
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?
Antworten
  • IPSec
  • SSL
  • TLS 3.0
  • GPG

Frage 17

Frage
The process by which keys are managed by a third party, such as a trusted CA, is known as?
Antworten
  • key escrow
  • key renewal
  • key destruction
  • key management

Frage 18

Frage
What allows an application to implement an encryption algorithm for execution?
Antworten
  • counters
  • initialization vectors
  • crypto modules
  • crypto service providers

Frage 19

Frage
What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?
Antworten
  • Counter
  • Galois/Counter
  • Electronic Code Book
  • Cipher Block Chaining

Frage 20

Frage
What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?
Antworten
  • Cipher Block Chaining
  • Counter
  • Electronic Code Book
  • Galois/Counter

Frage 21

Frage
What common method is used to ensure the security and integrity of a root CA?
Antworten
  • Keep it in an offline state from the network
  • Keep it in an online state and encrypt it
  • Password protect the root CA
  • Only use the root CA infrequently

Frage 22

Frage
What cryptographic transport algorithm is considered to be significantly more secure than SSL?
Antworten
  • HTTPS
  • AES
  • TLS
  • ESSL

Frage 23

Frage
What is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest?
Antworten
  • counter
  • nonce
  • initialization vector
  • salt

Frage 24

Frage
What is used to create session keys?
Antworten
  • master secret
  • validation
  • crypto modules
  • domain validation

Frage 25

Frage
What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
Antworten
  • public web
  • web server
  • web client
  • private

Frage 26

Frage
What length SSL and TLS keys are generally considered to be strong?
Antworten
  • 128
  • 1024
  • 2048
  • 4096

Frage 27

Frage
What process links several certificates together to establish trust between all the certificates involved?
Antworten
  • certificate joining
  • certificate linking
  • certificate pairing
  • certificate chaining

Frage 28

Frage
What process will remove all private and public keys along with the user's identification information in the CA?
Antworten
  • destruction
  • revocation
  • deletion
  • suspension

Frage 29

Frage
What protocol below supports two encryption modes: transport and tunnel?
Antworten
  • HTTPS
  • SSL
  • TLS
  • IPSec

Frage 30

Frage
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
Antworten
  • SSL
  • EAP
  • TLS
  • PEAP

Frage 31

Frage
SSL v3.0 is considered more secure than TLS v1.2
Antworten
  • True
  • False

Frage 32

Frage
What term best represents the resiliency of a cryptographic key to attacks?
Antworten
  • key bits
  • key resiliency
  • key strength
  • key space

Frage 33

Frage
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
Antworten
  • transitive trust
  • distributed trust
  • third-party trust
  • bridge trust

Frage 34

Frage
What type of trust model is used as the basis for most digital certificates used on the Internet?
Antworten
  • distributed trust
  • related trust
  • managed trust
  • third-party trust

Frage 35

Frage
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?
Antworten
  • third-party
  • distributed
  • web of
  • mutual

Frage 36

Frage
Which of the following certificates are self-signed?
Antworten
  • root digital certificates
  • trusted digital certificates
  • web digital certificates
  • user digital certificates

Frage 37

Frage
Which of the following certificates verifies the identity of the entity that has control over the domain name?
Antworten
  • validation digital certificate
  • root digital certificates
  • domain validation digital certificate
  • web digital certificates

Frage 38

Frage
Which of the following is an enhanced type of domain digital certificate?
Antworten
  • Trusted Validation
  • Extended Validation
  • Primary Validation
  • Authorized Validation

Frage 39

Frage
Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?
Antworten
  • salt
  • counter
  • nonce
  • initialization vector

Frage 40

Frage
Which of the following is a valid way to check the status of a certificate? (Choose all that apply.)
Antworten
  • Online Certificate Status Protocol
  • Certificate Revocation List
  • Certificate Revocation Authority
  • Revocation List Protocol

Frage 41

Frage
Why is IPsec considered to be a transparent security protocol?
Antworten
  • IPsec's design and packet header contents are open sourced technologies
  • IPsec uses the Transparent Encryption (TE) algorithm
  • IPsec is designed to not require modifications of programs, or additional training, or additional client setup
  • IPsec packets can be viewed by anyone
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002