• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Which of the following does not apply to a hashing algorithm?




One-way


Long key size


Variable-length input with fixed-length output


Collision resistance

Long key size

During a training session, you want to impress upon users how serious security is and, in particular, cryptography. To accomplish this, you want to give them as much of an overview about the topic as possible. Which government agency should our mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?




NSA


NIST


IEEE


ITU

NIST

Which of the following is the most widely used asymmetric algorithm today?




RSA


AES


3DES


SHA

RSA

You're a member of a consortium wanting to create a new standard that will effectively end all spam. After years of meeting, the group has finally come across a solution and now wants to propose it. The process of proposing a new standard or method on the Internet is referred to by which acronym?




WBS


X.509


RFC


IEEE

RFC

Mary claims that she didn't make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phones, and time clock records show that she was the only person working at the time. What do these records provide?




Integrity


Confidentiality


Authentication


Nonrepudiation

Nonrepudiation

Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?




TLS


SSH


RSH


X.509

TLS

MAC is an acronym for what as it relates to cryptography?




Media access control


Mandatory access control


Message authentication code


Multiple advisory committees

Message authentication code

You've been brought in as security consultant for a small bicycle manufacturing firm. Immediately, you notice that they're using a centralized key-generating process, and you make a not to dissuade them from that without delay. What problem is created by using a centralized key-generating process




Network security


Key transmission


Certificate revocation


Private Key security

Key Transmission

You need to encrypt your hard drive. Which of the following is the best choice?




DES


RSA


AES


SHA

AES

As the head of IT for MTS, you're explaining some security concerns to a junior administrator who has just been hired. you're trying to emphasize the need to know what is important and what isn't. What of the following is not a consideration in key storage?




Environmental controls


Physical security


Hardened servers


Administrative controls

Environmental Controls

What is the primary organization for maintaining certificates called?




CA


RA


LRA


CRL

CA

Due to a breach, a certificate must be permanently revoked and you don't want it to ever be used again. What is often used to revoke a certificate?




CRA


CYA


CRL


PKI

CRL

Which organization can be used to identify an individual for certificate issue in a PKI environment?




RA


LRA


PKE


SHA

LRA

Kristin from Payroll has left the office on maternity leave and won't return for at lease six weeks. You've been instructed to suspend her key. Which of the following statements is true?




In order to be used, suspended keys must be revoked.


Suspended keys don;t expire


Suspended keys can be reactivated


Suspending keys is a bad practice

Suspended keys can be reactivated

What document describes how a CA issues certificates and for what they are used?




Certificate policies


Certificate practices


Revocation authority


CRL

Certificate policies

After returning from a conference, your manager informs you that he has learned that law enforcement has the right, under subpoena, to conduct investigations using keys. He wants you to implement measures to make such an event run smoothly should it ever happen. What is the process of storing keys for use by law enforcement called?




Key escrow


Key archival


Key renewal


Certificate rollover

Key escrow

The CRL takes time to be fully disseminated. Which protocol allows a certificate's authenticity to be immediately verified?




CA


CP


CRC


OCSP

OCSP

Which set of specification is designed to allow XML based programs access to PKI services?




XKMS


XMLS


PKXMS


PKIXMLS

XKMS

Which of the following is similar to Blowfish but works on 128-but blocks?




Twofish


IDEA


CCITT


AES

Twofish

Your IT manager has stated that you need to select an appropriate tool for email encryption. Which of the following would be the best choice?




MD5


IPSEC


TLS


PGP

PGP