• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
What is the main function of a TPM hardware chip?



A. Provide authentication credentials on a hardware device


B. Control access to removable media


C. Perform bulk encryption in a hardware processor


D. Generate and store cryptographic keys

D. Generate and store cryptographic keys
Which of the following is a direct protection of integrity?



A. Digital signature


B. Asymmetric encryption


C. Digital envelope


D. Symmetric encryption

A. Digital signature
Which of the following statements is true when comparing symmetric and asymmetric cryptography?



A. metric key cryptography is used to distribute symmetric keys.


B. metric key cryptography is quicker than symmetric key cryptography while processing large amounts of data.


C. Symmetric key cryptography uses a public and private key pair.


D. Symmetric key cryptography should be used for large, expanding environments.

A. metric key cryptography is used to distribute symmetric keys.

Which of the following is not true in regards to S/MIME?




A. Uses X. 509 version 3 certificates


B. Uses IDEA encryption


C. Included in most Web browsers


D. Authenticates through digital signatures



B. Uses IDEA encryption
Which of the following technologies is based upon SSL (Secure SOckets Layer)?



A. IPSec (Internet ProtocolSecurity)


B. TLS (Transport Layer Security)


C. L2TP (Layer 2 Tunneling Protocol)


D. 5/MIME (Secure Multipurpose Internet Mail Extensions)

B. TLS (Transport Layer Security)
Which of the following can be used to encrypt Web, e-mail, telnet, file transfer, and SNMP traffic?



A. EFS (Encryption File System)


B. IPSec (Internet ProtocolSecurity)


C. SHTTP (Secure Hypertext Transfer Protocol) D. SSL (Secure Sockets Layer)

B. IPSec (Internet ProtocolSecurity)
What is the primary use of Secure Electronic Transaction (SET)?



A. Validate the integrity of database changes


B. Encrypt e-commerce traffic


C. Protect credit card information transmissions D. Secure electronic checking account transactions

C. Protect credit card information transmissions
Secure Multi-Purpose Internet Mail Extensions (S/MIME) is used primarily to protect what?



A. Instant messages


B. Newsgroup postings


C. Web surfing


D. E-mail attachments

D. E-mail attachments
The PGP or Pretty Good Privacy encryption utility relies upon what algorithms? (Select two. )



A. AES


B. IDEA


C. Blowfish


D. 3DES

B. IDEA and D. 3DES
Which public key encryption system does PGP (Pretty Good Privacy) use for key exchange and digital signatures?



A. RES


B. Elliptic Curve


C. ElGamal


D. Merkle-Hellman Knapsack

A. RES
HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) can be used to provide security for what type of traffic?



A. Telnet


B. Url


C. Web


D. E-mail

C. Web
Which of the following communications encryption mechanisms has a specific version for wireless communications?



A. IPSec (Internet ProtocolSecurity)


B. HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)


C. TLS (Transport Layer Security)


D. SSL (Secure Sockets Layer)

C. TLS (Transport Layer Security)
Which security mechanism can be used to harden or protect e-commerce traffic from Web servers?



A. Penetration testing


B. Access control lists


C. SSL


D. Removing unneeded protocols

C. SSL
What form of cryptography is not scalable as a stand-alone system for use in very large and ever expanding environments where data is frequently exchanged between different communication partners?



A. Public key cryptography


B. Hashing cryptography


C. Symmetric cryptography


D. Asymmetric cryptography

C. Symmetric cryptography
What form of cryptography is scalable for use in very large and ever-expanding environments where data is frequently exchanged between different communication partners?



A. Symmetric cryptography


B. Asymmetric cryptography


C. Hashing cryptography


D. Private key cryptography

B. Asymmetric cryptography