• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

_______________ is a protocol used to secure IP packets during transmission across a network. It offers authentication, integrity, and confidentiality services. It uses Authentication Headers (AHs) and Encapsulating Security Payload (ESP) to accomplish this functionality.

IPSec

A protocol introduced by Netscape that provides secure connections for web transfers using encryption. It also provides server authentication and confidentiality of information transfers.

Secure Sockets Layer(SSL)

A(n) _______________ is an entity that is responsible for issuing and revoking certificates. This term is also applied to server software that provides these services.

Certificate Authority

A(n) _______________ is an entity that is responsible for issuing and revoking certificates. This term is also applied to server software that provides these services.

Certificate Revocation List(CRL)

_______________ is a format that has been adopted to standardize digital certificates.

X.509

An ifrastructure for binding a public key to a known user through a trusted intermediary, typically a certificate authority, is called a _______________.

Public Key Infrastructure (PKI)

The _______________ is a protocol framework that defines the mechanics of implementing a key exchange protocol and negotiation of a security policy.

Internet Security Association and Key Management Protocol (ISAKMP)

The encryption protocol that is used on Wireless Application (WAP) networks is called _______________.

Wireless Transport Layer Security (WTLS)

A protocol for transmitting data to small handheld devices like cellular phones is the _______________.

Wireless Application Protocol (WAP)

_______________ is a popular encryption program that has the ability to encrypt and digitally sign e-mail and files.

Pretty Good Privacy (PGP)

Which of the following is a secure e-mail standard?

S/MIME

Secure Sockets Layer uses what port to communicate?

443

What protocol is used to establish a CA?

The Certificate Management Protocol

Which of the following is a joint set of security processes and standards used by approved laboratories to award an Evaluation Assurance Level (EAL) from EAL1 to EAL7?

Common Criteria

The entity requesting an SA sets what?

The initiator cookie

Which of the following provides connection security by using common encryption methods?

The TLS Record Protocol

A relationship where two or more entities define how they will communicate securely is known as what?

A security association

Transport Layer Security consists of which two protocols?

The TLS Record Protocol and TLS Handshake Protocol

Which of the following provides a method for implementing a key exchange protocol?

ISAKMP

Which organization created PKCS?

RSA

Which of the following is subject to reuse of its initialization vector?

Wired Equivalency Protocol (WEP)

Which of the following is a detailed standard for creating and implementing security policies?

ISO/IEC 27002

Which of the following is not part of a public key infrastructure?

TEMPEST

What is the purpose of XKMS?

Defines services to manage heterogeneous PKI operations via XML

Which of the following is used to grant permissions using rule-based, role-based, and rank-based access controls?

Attribute Certificate