QuestionQuestion

Which statement best describes an SSL session?
It is a transient client/server transport that provides a negotiated type of service.
It specifies the security parameters that apply to an associated client and server.
It is a transient client/server transport that provides a negotiated type of service.
It defines the sequence of messages exchanged between a client and server.
It defines the content of messages exchanged between a client and a server.

The SSL record protocol provides confidentiality and message integrity services. Which other SSL protocol provides the keys the SSL record protocol uses for these purposes?

A legacy application used by a small workgroup needs to have its network communications secured. Which protocol will require the least amount of effort to add security?
SSL
Kerberos
Tokens

An accountant is sending an email and wants to ensure non-repudiation. Which security mechanism should the accountant use?
Authentication exchange
A security engineer uses a digital certificate and Pretty Good Privacy (PGP) when sending an e-mail. What is the digital certificate used for?
Non-repudiation of the sender
Confidentiality of the receiver
Availibility of the system
Integrity of the message

A cryptographer wants to encrypt a data file. She wants the cryptography method to be fast and have a small key length. The secret key is protected by an unspecified method. Which cryptographic mechanism should she use?

An executive needs to send a secure e-mail to a client about a request for proposals. Which cryptographic system will ensure that the executive's keys are secure?

A diplomat wants to send a secure e-mail message to another diplomat about a potential terrorist attack. Which cryptosystem should be used to accomplish this goal?
PGP
Symmetric crypto
Block cipher
Hash

Quantum cryptography uses two separate channels to connect the sender and receiver. Is either channel secure enough to send information in clear text?

A chief executive officer uses symmetric cryptography but is worried about the secret key getting into industrial spies' hands. Which type of cryptography should this person use?

A Pretty Good Privacy user chooses to distribute a public key to senders. What is the reason for this type of distribution?

An information technology analyst is worried about speed of encryption but not the protection of secret keys. Which cryptography method should the analyst use?

Which authentication framework is used by WPA2?
Extensible Authentication Protocol (EAP)
PAP, CHAP, ARP

What is the protocol for authentication in wireless security?

Which wireless encryption algorithm has the client extract the server's public key from the received certificate, thus generating a secret value, encrypting it with the public key, and sending it to the server?

Why is identity-based encryption for wireless networks important?

An engineer needs to determine how large a key must be in order for an algorithm to minimize the possibility of an item being brute-forced within a certain time. What can the algorithm/key size be called in this application?
? Computationally secure ?
Conditionally secure
Unconditionally secure
Minimally secure

Two enterprise architects are working together to set up a new certificate authority. During setup, they carefully consider the bit size and then settle on 2048 bits. Which kind of threat does this process hedge against?
? Mathematical
Frequency
Ciphertext
Timing

A critical government information system requires that both the server and the user be authenticated to each other. Which type of identity system will fulfill the requirements?
Tokens
Passwords
Biometrics
X.509 certificates

An end-user is trying to verify a certificate he has received from a partner company. His computer responds that the certificate is from an unknown certificate authority and that it cannot be verified.
The certificate is likely counterfeit.
The user should contact the CA.

A user who has recently married and changed her name has found that her X.509 certificate, which listed her maiden name, is now on a certificate revocation list.

Solution PreviewSolution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

Which statement best describes an SSL session?
The answer is: It is a transient client/server transport that provides a negotiated type of service.

The SSL record protocol provides confidentiality and message integrity services. Which other SSL protocol provides the keys the SSL record protocol uses for these purposes?
ChangeCipherSpec Protocol

A legacy application used by a small workgroup needs to have its network communications secured. Which protocol will require the least amount of effort to add security?
Kerberos...

By purchasing this solution you'll be able to access the following files:
Solution.docx.

$74.00
for this solution

or FREE if you
register a new account!

PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

Find A Tutor

View available Cryptography Tutors

Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Decision:
Upload a file
Continue without uploading

SUBMIT YOUR HOMEWORK
We couldn't find that subject.
Please select the best match from the list below.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Live Chats