The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
false
true
2. Multiple Choice
30 seconds
1 pt
At what stage can a certificate no longer be used for any type of authentication?
lost confidentiality
expiration
3. Multiple Choice
30 seconds
1 pt
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
bridge trust
third party
4. Multiple Choice
30 seconds
1 pt
Why is IPsec considered to be a transparent security protocol?
IPsec is designed to require modifications of programs, or additional training, or additional client setup
IPsec is designed to not require modifications of programs, or additional training, or additional client setup
5. Multiple Choice
30 seconds
1 pt
Digital certificates cannot be used to identify objects other than users.
False
True
6. Multiple Choice
30 seconds
1 pt
What protocol below supports two encryption modes: transport and tunnel?
RSA
GPG
IPsec
7. Multiple Choice
30 seconds
1 pt
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?
Registration Authority
distributed trust
Certificate practice statement (CPS)
8. Multiple Choice
30 seconds
1 pt
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.
False
True
9. Multiple Choice
30 seconds
1 pt
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
IPSec
SSH
SSL
telnet
10. Multiple Choice
30 seconds
1 pt
A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by trusted third party.
Digital certificate
Certificate Repository (CR)
Certificate Policy (CP)
11. Multiple Choice
30 seconds
1 pt
A process in which keys are managed by a third party, such as a trusted CA.
Key Escrow
Public key
Ephemeral key
12. Multiple Choice
30 seconds
1 pt
Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server.
Key Escrow
Session Keys
Ephemeral key
13. Multiple Choice
30 seconds
1 pt
Often referred to as Private key cryptography.
Symmetric encryption
Asymmetric encryption
14. Multiple Choice
30 seconds
1 pt
Using what mechanism below can the non-repudiation of an e-mail and it's content be enforced?
Asymmetric encryption
symmetric encryption
15. Multiple Choice
30 seconds
1 pt
A sensitive connection between a client and a web server uses what class of certificate?
Class 2
Class 3
Class 4
16. Multiple Choice
30 seconds
1 pt
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:
server digital certificates
Server digital
17. Multiple Choice
30 seconds
1 pt
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?
third-party
Certificate Policy
18. Multiple Choice
30 seconds
1 pt
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?
Hashing
Encryption
Asymmetric Encryption
19. Multiple Choice
30 seconds
1 pt
A framework for all of the entities involved in digital certificates for digital certificate management is known as:
Public key infrastructure
Private key infrastructure
Public-Key Cryptographic Standards
20. Multiple Choice
30 seconds
1 pt
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.