Week 6

Your page rank:

Total word count: 491
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:

Server digital

Digital certificates cannot be used to identify objects other than users.


Select below the secure alternative to the telnet protocol:


SSL and TLS keys of what length are generally considered to be strong?


Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature.


Why is IPsec considered to be a transparent security protocol?​

IPsec is designed to not require modifications of programs, or additional training, or additional client setup

What is the name for an organization that receives, authenticates, and processes certificate revocation requests?

Registration Authority

What cryptographic transport algorithm is considered to be significantly more secure than SSL?


The Encapsulating Security Payload (ESP) protocol ensures IPsec’s confidentiality.​


The Authentication Header (AH) protocol is a part of what encryption protocol suite below?​


What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?


Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.


A framework for all of the entities involved in digital certificates for digital certificate management is known as:

Public key infrastructure

The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.


What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

bridge trust

Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

Certification Authority

Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?

distributed trust

At what stage can a certificate no longer be used for any type of authentication?


When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?


A sensitive connection between a client and a web server uses what class of certificate?

Class 2

Using what mechanism below can the non-repudiation of an e-mail and it’s content be enforced?

Asymmetric encryption

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

Certificate practice statement (CPS)

The process by which keys are managed by a third party, such as a trusted CA, is known as?

Key escrow

What kind of certificate is typically used by an individual to secure e-mail transmissions?

Personal digital

What type of cryptographic algorithm can be used to ensure the integrity of a file’s contents?


Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message