Test 3 Flashcards
The MIME specification extends the email message format beyond plain text, enabling the transfer of graphics, audio, and video files over the Internet mail system. S/MIME is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.
True
What is the name of a network protocol that enables secure file transfer over SSH?
SFTP
SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption.
False
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
SSH
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
IPsec
Which part of IPsec provides authentication, integrity, and confidentiality?
ESP
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
VPN
Which protocol enables secure, real-time delivery of audio and video over an IP network?
SRTP
An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is called:
CCMP
A security protocol designed to improve the security of existing WEP implementations is known as:
TKIP
Which of the following answers refer(s) to deprecated/insecure encryption protocols and cryptographic hash functions? (Select all that apply)
SHA-1 ( Missed)
SSL ( Missed)
RC4
MD5
DES
Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?
TLS
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).
False
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).
True
Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)
DHE ( Missed)
ECC
RSA