Chapter 4 Flashcards

admin

Textbook solutions

Students also studied

Study guides

Practice questions for this set

Stream ciphers work on multiple characters at a time.
True
False

A(n) _____ is a published phối of rules that govern the operation of a PKI.
A. signature resource guide (SRG)
B. certificate policy (CP)
C. enforcement certificate (EF)
D. certificate practice statement (CPS)

What block cipher mode of operation encrypts plaintext and computes a message authentication code to tát ensure that the message was created by the sender and that it was not tampered with during transmission?
A. Electronic Code Book
B. Counter
C. Cipher Block Chaining
D. Galois/Counter

Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?
A. initialization vector
B. counter
C. salt
D. nonce

What type of trust model is used as the basis for most digital certificates used on the Internet?
A. third-party trust
B. distributed trust
C. related trust
D. managed trust

What protocol, developed by Netscape in 1994, is designed to tát create an encrypted data path between a client and server that could be used on any platform or operating system?
A. SSL
B. PEAP
C. TLS
D. EAP

Which of the following certificates are self-signed?
A. trusted digital certificates
B. trang web digital certificates
C. root digital certificates
D. user digital certificate

Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?
A. initialization vector
B. counter
C. salt
D. nonce

What block cipher mode of operation encrypts plaintext and computes a message authentication code to tát ensure that the message was created by the sender and that it was not tampered with during transmission?
A. Electronic Code Book
B. Counter
C. Cipher Block Chaining
D. Galois/Counter

Stream ciphers work on multiple characters at a time.
True
False

Some cryptographic algorithms require that in addition to tát a key another value can or must be input.
True
False

Root digital certificates are should never be self-signed.
True
False

A Subject Alternative Name (SAN) digital certificate, is also known as a Unified Communications Certificate (UCC).
True
False

Some CAs issue only entry-level certificates that provide domain-only validation.
True
False

Which digital certificate displays the name of the entity behind the website?
A. Online Certificate Status Certificate
B. Session Certificate
C. Extended Validation (EV) Certificate
D. D. X.509 Certificate

A digital certificate associates _____.
A. the user's identity with his public key
B. a user's public key with his private key
C. a user's private key with the public key
D. a private key with a digital signature

Which of these is considered the strongest cryptographic transport protocol?
A. SSL v2.0
B. SSL v2.0
C. TLS v1.2
D. TLS v1.0

Which of the following is NOT a method for strengthening a key?
A. Cryptoperiod
B. Randomness
C. Variability
D. Length

A(n) _____ is a published phối of rules that govern the operation of a PKI.
A. enforcement certificate (EF)
B. signature resource guide (SRG)
C. certificate policy (CP)
D. certificate practice statement (CPS)