Textbook solutions
Students also studied
Study guides
Practice questions for this set
Stream ciphers work on multiple characters at a time.
True
False
A(n) _____ is a published phối of rules that govern the operation of a PKI.
A. signature resource guide (SRG)
B. certificate policy (CP)
C. enforcement certificate (EF)
D. certificate practice statement (CPS)
What block cipher mode of operation encrypts plaintext and computes a message authentication code to tát ensure that the message was created by the sender and that it was not tampered with during transmission?
A. Electronic Code Book
B. Counter
C. Cipher Block Chaining
D. Galois/Counter
Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?
A. initialization vector
B. counter
C. salt
D. nonce
What type of trust model is used as the basis for most digital certificates used on the Internet?
A. third-party trust
B. distributed trust
C. related trust
D. managed trust
What protocol, developed by Netscape in 1994, is designed to tát create an encrypted data path between a client and server that could be used on any platform or operating system?
A. SSL
B. PEAP
C. TLS
D. EAP
Which of the following certificates are self-signed?
A. trusted digital certificates
B. trang web digital certificates
C. root digital certificates
D. user digital certificate
Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?
A. initialization vector
B. counter
C. salt
D. nonce
What block cipher mode of operation encrypts plaintext and computes a message authentication code to tát ensure that the message was created by the sender and that it was not tampered with during transmission?
A. Electronic Code Book
B. Counter
C. Cipher Block Chaining
D. Galois/Counter
Stream ciphers work on multiple characters at a time.
True
False
Some cryptographic algorithms require that in addition to tát a key another value can or must be input.
True
False
Root digital certificates are should never be self-signed.
True
False
A Subject Alternative Name (SAN) digital certificate, is also known as a Unified Communications Certificate (UCC).
True
False
Some CAs issue only entry-level certificates that provide domain-only validation.
True
False
Which digital certificate displays the name of the entity behind the website?
A. Online Certificate Status Certificate
B. Session Certificate
C. Extended Validation (EV) Certificate
D. D. X.509 Certificate
A digital certificate associates _____.
A. the user's identity with his public key
B. a user's public key with his private key
C. a user's private key with the public key
D. a private key with a digital signature
Which of these is considered the strongest cryptographic transport protocol?
A. SSL v2.0
B. SSL v2.0
C. TLS v1.2
D. TLS v1.0
Which of the following is NOT a method for strengthening a key?
A. Cryptoperiod
B. Randomness
C. Variability
D. Length
A(n) _____ is a published phối of rules that govern the operation of a PKI.
A. enforcement certificate (EF)
B. signature resource guide (SRG)
C. certificate policy (CP)
D. certificate practice statement (CPS)