Filters
Question type

Study Flashcards

The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user's public key.

Correct Answer

verifed

verified

False

"Elliptic curve cryptography follows the associative property."

Correct Answer

verifed

verified

1. VPN is abbreviated as __________


A) visual private network
B) virtual protocol network
C) virtual private network
D) virtual protocol networking

Correct Answer

verifed

verified

ECC encryption system is __________


A) symmetric key encryption algorithm
B) asymmetric key encryption algorithm
C) not an encryption algorithm
D) block cipher method

Correct Answer

verifed

verified

The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.


A) man-in-the-middle
B) ciphertext attack
C) plaintext attack
D) none of the above

Correct Answer

verifed

verified

_________ type of VPNs are used for home private and secure connectivity.


A) remote access vpns
B) site-to-site vpns
C) peer-to-peer vpns
D) router-to-router vpns

Correct Answer

verifed

verified

Which of the statements are not true to classify VPN systems?


A) protocols used for tunnelling the traffic
B) whether vpns are providing site-to-site or remote access connection
C) securing the network from bots and malwares
D) levels of security provided for sending and receiving data privately

Correct Answer

verifed

verified

There are ________ types of VPN protocols.


A) 3
B) 4
C) 5
D) 6

Correct Answer

verifed

verified

Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?


A) remote access vpns
B) site-to-site vpns
C) peer-to-peer vpns
D) country-to-country vpns

Correct Answer

verifed

verified

What types of protocols are used in VPNs?


A) application level protocols
B) tunnelling protocols
C) network protocols
D) mailing protocols

Correct Answer

verifed

verified

he ________ method provides a one-time session key for two parties.


A) diffie-hellman
B) rsa
C) des
D) aes

Correct Answer

verifed

verified

Extensions to the X.509 certificates were added in version ____


A) 1
B) 2
C) 3
D) 4

Correct Answer

verifed

verified

There are _________ types of VPNs.


A) 3
B) 2
C) 5
D) 4

Correct Answer

verifed

verified

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?


A) 42 bytes
B) 32 bytes
C) 36 bytes
D) 48 bytes

Correct Answer

verifed

verified

In the handshake protocol which is the message type first sent between client and server ?


A) server_hello
B) client_hello
C) hello_request
D) certificate_request

Correct Answer

verifed

verified

________function creates a message digest out of a message.


A) encryption
B) decryption
C) hash
D) none of the above

Correct Answer

verifed

verified

C

ECC stands for


A) elliptic curve cryptography
B) enhanced curve cryptography
C) elliptic cone cryptography
D) eclipse curve cryptography

Correct Answer

verifed

verified

One commonly used public-key cryptography method is the ______ algorithm.


A) rss
B) ras
C) rsa
D) raa

Correct Answer

verifed

verified

A digital signature needs ____ system


A) symmetric-key
B) asymmetric-key
C) either (a) or (b)
D) neither (a) nor (b)

Correct Answer

verifed

verified

B

The DSS signature uses which hash algorithm?


A) md5
B) sha-2
C) sha-1
D) does not use hash algorithm

Correct Answer

verifed

verified

Showing 1 - 20 of 23

Related Exams

Show Answer