Test 3 Flashcards

1
Q

The MIME specification extends the email message format beyond plain text, enabling the transfer of graphics, audio, and video files over the Internet mail system. S/MIME is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of a network protocol that enables secure file transfer over SSH?

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol enables secure, real-time delivery of audio and video over an IP network?

A

SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is called:

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security protocol designed to improve the security of existing WEP implementations is known as:

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refer(s) to deprecated/insecure encryption protocols and cryptographic hash functions? (Select all that apply)

A

SHA-1 ( Missed)
SSL ( Missed)
RC4
MD5
DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)

A

DHE ( Missed)
ECC
RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following algorithms do(es) not fall into the category of asymmetric encryption? (Select all that apply)

A

AES ( Missed)
DES
IDEA ( Missed)
RC4

17
Q

The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.

A

True

18
Q

Which of the answers listed below refers to a shared secret authentication method used in WPA, WPA2, and EAP?

A

PSK

19
Q

Which of the following answers refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

A

IKE

20
Q

Which of the answers listed below refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?

A

DHE

21
Q

Which of the following answers refers to a cryptographic key exchange protocol that leverages ECC for enhanced security and efficiency?

A

ECDHE

22
Q

Which of the answers listed below refers to a solution designed to strengthen the security of session keys?

A

PFS

23
Q

Which of the following answers refers to a public-key cryptosystem that leverages the mathematical properties of large prime numbers to facilitate secure key exchange, create digital signatures, and encrypt data?

A

RSA

24
Q

Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?

A

ECC

25
Q

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

A

AES