Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONSec 6.2, 6.3

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Sec 6.2, 6.3

Description:
Sec 6.2, 6.3

Author:
BA
(Other tests from this author)

Creation Date:
10/06/2018

Category:
Others

Number of questions: 25
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher. What is this? Diffie-Hellman Key Exchange SHA-2 MD5 RIPEMD.
What is this?.
Algorithm is a widely used hash function producing a 128-bit hash value. Although initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. MD5 SHA-2 RIPEMD HMAC.
Hashing method Developed by the National Security Agency (NSA) and is a US Federal Information Processing Standard. Can go up to 512 bit digests. SHA-2 MD5 SHA-1 RIPEMD.
Cryptographic hash function based upon the Merkle–Damgård construction. It is used in the Bitcoin standard. RIPEMD MD5 HMAC SHA-2.
What is this? • Combine a hash with a secret key • Verify data integrity and authenticity • No fancy asymmetric encryption required • Used in network encryption protocols, ie IPsec, TLS MD5 SHA-1 RIPEMD HMAC.
A symmetric key encryption algorithm that uses block cipher and is strong but is in limited used because of a short key length. DES AES HMAC Blowfish.
Latest symmetrical block cipher that is used today. AES RC4 3DES DES.
Stream cipher algorithm that is commonly implemented in commercial applications RC4 RC6 AES DES.
What does this describe? • Asymmetrical • Does not itself encrypt or authenticate • It’s an anonymous key-agreement protocol • Used for Perfect Forward Secrecy Diffie-Hellman RSA AES RC4.
Asymmetrical method of cryptography used in encryption and digital signatures. It's widely used as the standard today in encryption and the core technology in securing organizations doing business over the internet. RSA AES DES RC4.
The only form of cryptography that is totally unbreakable. However, the key itself must be as long as the message, therefore, it presents a huge storage tradeoff. One-time Pad PGP PAP RC4.
Encrypts email and is used as an alternative to S/MIME. Anyone can use it. PGP One-time Pad RSA HMAC.
Line these up. Hashing Technology Encryption Technology.
Name the internet transport encryption algorithms.
Set of security protocols used to support VPNs. It provides for the secure exchange of packets at OSI model layer 3.
Line these up. Strong Weak.
Which of the following are key stretching libraries? (Pick TWO) bcrypt PBKDF2 NTLM PGP PKI.
Set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
RC4 - strong or weak? Strong Weak.
Certificates are used for: (Select TWO). Client authentication. WEP encryption. Access control lists. Code signing. Password hashing.
Some customers have reported receiving an untrusted certificate warning when visiting the company’s website. The administrator ensures that the certificate is not expired and that customers have trusted the original issuer of the certificate. Which of the following could be causing the problem? The intermediate CA certificates were not installed on the server. The certificate is not the correct type for a virtual server. The encryption key used in the certificate is too short. The client’s browser is trying to negotiate SSL instead of TLS.
Digital certificates can be used to ensure which of the following? (Select TWO). Availability Confidentiality Verification Authorization Non-repudiation.
What prevents one party from denying actions they carried out and is one thing that certificates ensure?.
A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used? RC4 DES 3DES AES.
Report abuse Consent Terms of use