Module 7 Flashcards
Which is an IPsec protocol that authenticates that packets received were sent from the source?
- AH
- PXP
- DER
- CER
Authentication Header (AH) protocol.
What is the name of the device protected by a digital certificate?
-RCR
- V2X2
- CN
- TLXS
The common name (CN)
What is the strongest technology that would assure Alice that Bob is the sender of a message?
- Digital signature
- Encrypted signature
- Digital certificate
- Digest
Digital certificate
Which is the first step in a key exchange?
- The web browser sends a message (“ClientHello”) to the server.
- The web browser verifies the server certificate.
- The browser generates a random value (“pre-master secret”).
- The web server sends a message (“ServerHello”) to the client.
The web browser sends a message (“ClientHello”) to the server.
Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need?
- Root
- Domain validation
- Extended validation
- Website validation
Domain validation
Which of the following is the earliest and most general cryptographic protocol?
- SSL
- HTTPS
- SSH
- TLS
secure sockets layer (SSL)
John and Sarah are working for Star Alliance. John had to send certain confidential data and messages to Sarah online. The use of which of the following will ensure that the message’s sender is, in fact, John?
-Public key
- Physical signature
- Digital signature
- Digital certificate
Digital certificate
Which of the following digital certificates are self-signed and do not depend on the higher-level certificate authority (CA) for authentication?
-Root digital certificates
- Intermediate digital certificates
- User digital certificates
- Domain digital certificates
Root digital certificates
Which of the following protocols are used to secure HTTP?
- TLS and SRTP
- SSH and SSL
- TLS and SSH
- TLS and SSL
Transport layer security (TLS) and the older secure sockets layer (SSL)
Which of the following is a process where a private key is split into two halves, encrypted, and stored separately for future use?
- Revocation
- Escrow
- Renewal
- Destruction
Escrow is a process in which keys are managed by a trusted third party.
You have been asked to implement a block cipher mode of operation that requires both the sender and receiver of the message to have access to a synchronous counter that adds an AAD to the transmission. Which operating block cipher mode should you use?
- ECB
- CBC
- CTR
- GCM
GCM
Which of the following provides confidentiality services?
- Authentication mode
- Transport mode
- Stream cipher mode
- Unauthentication mode
Unauthentication mode
Which of the following is defined as a structure for governing all the elements involved in digital certificate management?
- Web of trust model
- PKI
- M-of-N control
- CA
Public key infrastructure (PKI) is an underlying infrastructure for key management of public keys and digital certificates governing all the elements involved in the digital certificate management-including hardware, software, people, policies, and procedures-to create, store, distribute, and revoke digital certificates. PKI is digital certificate management.
Malik and Chris are shopping for shoes on an e-commerce website and need to enter their credit card details. Which of the following can assure them that they are using the retailer’s authentic website and not an imposter’s look-alike site that will steal their credit card details?
- Digital signature
- Hash digest
- SSL
- Digital certificate
Digital certificate
Which of the following is a combination of encryption, authentication, and MAC algorithms, like a collection of instructions on securing a network?
- TLS
- Cipher suite
- Stream cipher
- SSH
Cipher suite is a named combination of the encryption, authentication, and message authentication code (MAC) algorithms.