Filters
Question type

Study Flashcards

What allows an application to implement an encryption algorithm for execution?


A) counters
B) crypto service providers
C) initialization vectors
D) crypto modules

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A document that describes in detail how a CA uses and manages certificates,as well as how end users register for a digital certificate,is known as?


A) Certificate practice statement (CPS)
B) Certificate policy (CP)
C) Lifecycle policy (LP)
D) Access policy (AP)

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?


A) Electronic Code Book
B) Galois/Counter
C) Cipher Block Chaining
D) Counter

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What cryptographic transport algorithm is considered to be significantly more secure than SSL?


A) AES
B) HTTPS
C) ESSL
D) TLS

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

D

Which of the following certificates verifies the identity of the entity that has control over the domain name?


A) validation digital certificate
B) root digital certificates
C) domain validation digital certificate
D) web digital certificates

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

C

Which of the following is an input value that must be unique within some specified scope,such as for a given period or an entire session?


A) salt
B) initialization vector
C) counter
D) nonce

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:


A) Registration Authority
B) Delegation Authority
C) Certification Authority
D) Participation Authority

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Explain how Cipher Block Chaining (CBC)operates.

Correct Answer

verifed

verified

After being encrypted,each ciphertext bl...

View Answer

A certificate repository (CR)is a publicly accessible centralized directory of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

True

What protocol uses SSL or TLS to secure communications between a browser and a web server?

Correct Answer

verifed

verified

The Hypert...

View Answer

What is a value that can be used to ensure that plaintext,when hashed,will not consistently result in the same digest?


A) salt
B) initialization vector
C) counter
D) nonce

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What protocol,developed by Netscape in 1994,is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?


A) SSL
B) TLS
C) PEAP
D) EAP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What process links several certificates together to establish trust between all the certificates involved?


A) certificate pairing
B) certificate linking
C) certificate joining
D) certificate chaining

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Root digital certificates are should never be self-signed.

A) True
B) False

Correct Answer

verifed

verified

What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks,and each block is then encrypted separately?


A) Electronic Code Book
B) Galois/Counter
C) Cipher Block Chaining
D) Counter

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?


A) bridge trust
B) distributed trust
C) third-party trust
D) transitive trust

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is a cipher suite?

Correct Answer

verifed

verified

A cipher suite is a named comb...

View Answer

What is a cryptographic key?

Correct Answer

verifed

verified

cryptographic key is a value that serves...

View Answer

Some CAs issue only entry-level certificates that provide domain-only validation.

A) True
B) False

Correct Answer

verifed

verified

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?


A) TLS 3.0
B) IPSec
C) GPG
D) SSL

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer