• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

8.1 Which of the following does not apply to a hashing algorithm?

a. One-Way


b. Long Key size


c. Variable-length input with fixed-length output


d. Collision resistance

8.2 During s training session, you impress upon users just how serious security is and, in particular, cryptography. To accomplish this you want to give them as much of an overview about the topic as possible. Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?

a. NSA


b. NIST


c. IEEE


d. ITU

8.3 Which of the following is the most widely used asymmetric algorithm today?

a. RSA


b. AES


c. 3DES


d. SHA

8.4 Your a member of a consortium wanting to create a new standard that will end spam. After years of meeting the group finally come across a solution and now want to propose it. The process of proposing a new standard or method on the internet is referred to by which acronym?

a. WBS


b. X.509


c. RFC


d. IEE

8.5 Mary claims that she did not make a phone call form her office to her competitor and tells them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?

a. integrity


b. Confindentiality


c. Authentication


d. Nonrepudiation

8.6 Mercury Technical Solutions has been using SSL, in a business environment for a number of years Despite the fact there have been no compromises in security, the new IT manager want to use stronger security than SSL can offer. Which of the following protocols is similar to SSL, but offers the ability to use additional security protocols?

a. TLS


b. SSH


c. RSH


d. X.509

8.7 MAC is an acronym for what as it relates to cryptography?

a. Media access control


b. mandatory access control


c. message authentication control


d. Multiple advisory committees

8.8 You've been brought in a as a security consultant for a small bicycle manufacturing firm.Immediately you realize there using a centralized key-generation process, and you make a note to dissuade them from that without delay. What problem is created by using a centralized key-generation process?

a. Network Securoty


b. Key transmission


c. certificate revocation


d. Private key security

8.9 You need to encrypt your hard drive. Which of the following is the best choice?

a. DES


b. RSA


c. AES


d. SHA

8.10 As the head of IT for MTS, you're explaining some security concerns to a junior administrator who has just been hired. Your trying to emphasize the need to know what is important and what inst.Which of the following is not a consideration in key storage?

a. Environmental controls


b Physical security


c. Hardened servers


d. Administrative controls

8.11 What is the primary organization for maintaining certificates called?

a. CA


b. RA


c. LRA


d. CRL

8.12 Due to a breach, a certificate must be permanently revoked and you don't want it to ever be used again. What is often used to revoke a certificate?

a. CRA


b. CYA


c. CRL


d. PKI

8.13 Which organization can be used to identify an individual for certificate issue in a PKI environment?

a. RA


b. LRA


c. PKE


d. SHA

8.14 Paul from payroll has kept the office on a maternity leave and wont return for at east six weeks. You've been instructed to suspend hi key. Which of the following statements is true?

a. In order to be used, suspended keys must be revoked.


b. Suspended keys don't expire


c. suspended keys can be reactivated


d. suspending keys is a bad practice.

8.15 What document describes how a CA issues certificates and for what they are used?

a. Certificate policies


b. certificate practices


c. Revocation authority


d. CRL

8.16 After returning from a conference, your manager informs you that he has learned that law enforcement has he right, under subpoena, to conduct investigations using keys. He wants you to implement measures to make such an event run smoothly should it ever happen. What is the process of storing keys for use by law enforcement called?

a. Key escrow


b. key archival


c. key renewal


d. Certificate rollover

8.17 The CRL takes time to be fully disseminated. Which protocol allows a certificate's authenticity to be immediately verified?

a. CA


b. CP


c. CRC


d. OCSP

8.18 Which set of specification is designed to allow XML-based programs access to PKI services?

a. XKMS


b. XMLS


c. PKXMS


d. PKIXMLS

8.19 Which of the following is similar to Blowfish but works on 128-bit blocks?

a. Twofish


b. IDEA


c. CCITT


d. AES

8.20 Your IT manager has started that you need to select an appropriate tool for email encryption.Which of the following would be the best choice?

a. MD5


b. IPSEC


c. TLS


d. PGP