Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
_______________ is a protocol used to secure IP packets during transmission across a network. It offers authentication, integrity, and confidentiality services. It uses Authentication Headers (AHs) and Encapsulating Security Payload (ESP) to accomplish this functionality. |
IPSec |
|
A protocol introduced by Netscape that provides secure connections for web transfers using encryption. It also provides server authentication and confidentiality of information transfers. |
Secure Sockets Layer(SSL) |
|
A(n) _______________ is an entity that is responsible for issuing and revoking certificates. This term is also applied to server software that provides these services. |
Certificate Authority |
|
A(n) _______________ is an entity that is responsible for issuing and revoking certificates. This term is also applied to server software that provides these services. |
Certificate Revocation List(CRL) |
|
_______________ is a format that has been adopted to standardize digital certificates. |
X.509 |
|
An ifrastructure for binding a public key to a known user through a trusted intermediary, typically a certificate authority, is called a _______________. |
Public Key Infrastructure (PKI) |
|
The _______________ is a protocol framework that defines the mechanics of implementing a key exchange protocol and negotiation of a security policy. |
Internet Security Association and Key Management Protocol (ISAKMP) |
|
The encryption protocol that is used on Wireless Application (WAP) networks is called _______________. |
Wireless Transport Layer Security (WTLS) |
|
A protocol for transmitting data to small handheld devices like cellular phones is the _______________. |
Wireless Application Protocol (WAP) |
|
_______________ is a popular encryption program that has the ability to encrypt and digitally sign e-mail and files. |
Pretty Good Privacy (PGP) |
|
Which of the following is a secure e-mail standard? |
S/MIME |
|
Secure Sockets Layer uses what port to communicate? |
443 |
|
What protocol is used to establish a CA? |
The Certificate Management Protocol |
|
Which of the following is a joint set of security processes and standards used by approved laboratories to award an Evaluation Assurance Level (EAL) from EAL1 to EAL7? |
Common Criteria |
|
The entity requesting an SA sets what? |
The initiator cookie |
|
Which of the following provides connection security by using common encryption methods? |
The TLS Record Protocol |
|
A relationship where two or more entities define how they will communicate securely is known as what? |
A security association |
|
Transport Layer Security consists of which two protocols? |
The TLS Record Protocol and TLS Handshake Protocol |
|
Which of the following provides a method for implementing a key exchange protocol? |
ISAKMP |
|
Which organization created PKCS? |
RSA |
|
Which of the following is subject to reuse of its initialization vector? |
Wired Equivalency Protocol (WEP) |
|
Which of the following is a detailed standard for creating and implementing security policies? |
ISO/IEC 27002 |
|
Which of the following is not part of a public key infrastructure? |
TEMPEST |
|
What is the purpose of XKMS? |
Defines services to manage heterogeneous PKI operations via XML |
|
Which of the following is used to grant permissions using rule-based, role-based, and rank-based access controls? |
Attribute Certificate |