Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server: |
Server digital |
Digital certificates cannot be used to identify objects other than users. |
False |
Select below the secure alternative to the telnet protocol: |
SSH |
SSL and TLS keys of what length are generally considered to be strong? |
4096 |
Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature. |
True |
Why is IPsec considered to be a transparent security protocol? |
IPsec is designed to not require modifications of programs, or additional training, or additional client setup |
What is the name for an organization that receives, authenticates, and processes certificate revocation requests? |
Registration Authority |
What cryptographic transport algorithm is considered to be significantly more secure than SSL? |
TLS |
The Encapsulating Security Payload (ESP) protocol ensures IPsec’s confidentiality. |
True |
The Authentication Header (AH) protocol is a part of what encryption protocol suite below? |
IPSec |
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system? |
SSL |
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system. |
True |
A framework for all of the entities involved in digital certificates for digital certificate management is known as: |
Public key infrastructure |
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol. |
False |
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs? |
bridge trust |
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates: |
Certification Authority |
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet? |
distributed trust |
At what stage can a certificate no longer be used for any type of authentication? |
expiration |
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established? |
third-party |
A sensitive connection between a client and a web server uses what class of certificate? |
Class 2 |
Using what mechanism below can the non-repudiation of an e-mail and it’s content be enforced? |
Asymmetric encryption |
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as? |
Certificate practice statement (CPS) |
The process by which keys are managed by a third party, such as a trusted CA, is known as? |
Key escrow |
What kind of certificate is typically used by an individual to secure e-mail transmissions? |
Personal digital |
What type of cryptographic algorithm can be used to ensure the integrity of a file’s contents? |
Hashing |
Week 6
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price