Test 3 Flashcards
The MIME specification extends the email message format beyond plain text, enabling the transfer of graphics, audio, and video files over the Internet mail system. S/MIME is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.
True
What is the name of a network protocol that enables secure file transfer over SSH?
SFTP
SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption.
False
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
SSH
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
IPsec
Which part of IPsec provides authentication, integrity, and confidentiality?
ESP
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
VPN
Which protocol enables secure, real-time delivery of audio and video over an IP network?
SRTP
An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is called:
CCMP
A security protocol designed to improve the security of existing WEP implementations is known as:
TKIP
Which of the following answers refer(s) to deprecated/insecure encryption protocols and cryptographic hash functions? (Select all that apply)
SHA-1 ( Missed)
SSL ( Missed)
RC4
MD5
DES
Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?
TLS
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).
False
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).
True
Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)
DHE ( Missed)
ECC
RSA
Which of the following algorithms do(es) not fall into the category of asymmetric encryption? (Select all that apply)
AES ( Missed)
DES
IDEA ( Missed)
RC4
The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.
True
Which of the answers listed below refers to a shared secret authentication method used in WPA, WPA2, and EAP?
PSK
Which of the following answers refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?
IKE
Which of the answers listed below refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?
DHE
Which of the following answers refers to a cryptographic key exchange protocol that leverages ECC for enhanced security and efficiency?
ECDHE
Which of the answers listed below refers to a solution designed to strengthen the security of session keys?
PFS
Which of the following answers refers to a public-key cryptosystem that leverages the mathematical properties of large prime numbers to facilitate secure key exchange, create digital signatures, and encrypt data?
RSA
Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?
ECC
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES