Deck 7: Standards and Protocols

ملء الشاشة (f)
exit full mode
سؤال
What is a certificate?

A)A certificate used to encrypt a message in PKI
B)A method of certifying the strength of an encryption key
C)A digital document that is used to verify the owner's identity
D)A certificate used in changing the key strength in PKI
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability?

A)FES,Federal encryption standards
B)FIPS,Federal Information Processing Standards
C)FIRE,Federal information regulation enterprise
D)FIES,Federal information and encryption standards
سؤال
What is IPsec?

A)A collection of IP security features designed to introduce security at the network or packet-processing layer
B)An application that encrypts e-mail
C)A standard setting group that dictates internet security standards
D)The company to first introduce the concept of encryption
سؤال
WEP has all of the following weaknesses of EXCEPT:

A)The secret key is only 40 bits long.
B)It is susceptible to collision attacks.
C)Even the 128 bit version is vulnerable.
D)Many wireless implementations do not come with WEP enabled.
سؤال
What is the ISO 17799?

A)A standard for creating and implementing security policies
B)A standard for international encryption of e-mail
C)A document used to develop physical security for a building
D)A document describing the details of wireless encryption
سؤال
What is CMP?

A)This protocol defines the messages and operations required to provide certificate management services
B)An encryption protocol used to verify a key length
C)An application that decrypts encrypted e-mail
D)A common message protocol that is used in e-mail
سؤال
What is XKMS?

A)Key Management Specification,which defines services to manage PKI operations within the Extensible Markup Language (XML)environment
B)An XML standard for e-mail encryption
C)A XML standard that used for wireless data exchange
D)A primary XML standard that is for application development
سؤال
Pretty good privacy (or PGP)is

A)A privacy group that fights against the government
B)A common encryption method for e-mail
C)A password management system
D)A method of security an operating system kernel
سؤال
For products evaluated by Common Criteria,the highest level of assurance is

A)EAL 1
B)EAL 8
C)EAL 7
D)EAL 9
سؤال
Certificates that should no longer be used due to compromise should be

A)Deleted
B)Moved to a different computer
C)Revoked
D)Removed
سؤال
HTTPS uses port

A)80
B)8080
C)443
D)433
سؤال
What function does Tier 1of the XML protocol service,based on the client requests and application requirements,perform?

A)It locates the appropriate key information for the client
B)Performs a data validation on a portion of the key
C)Automatically updates the firewall installed on the user's computer
D)Updates the cryptographic algorithms for the S/MIME
سؤال
PGP uses

A)Private key encryption
B)Asymmetric encryption
C)Symmetric encryption
D)Anomalous encryption
سؤال
What are the SSL and TLS used for?

A)A means of securing application programs on the system
B)To secure communication over the internet
C)A method to change from one form of PKI infrastructure to another
D)A secure way to reduce the amount of SPAM a system receives
سؤال
Which is the strongest implementation class of WTLS?

A)First class
B)Class 1
C)Class 2
D)Class 3
سؤال
What is Internet Security Association and Key Management ISAKMP?

A)A method for implementing a key exchange protocol and for negotiating a security policy
B)The name of the a organization that creates the encryption keys
C)A protocol to encrypt e-mail
D)A program that creates random numbers used in encryption keys
سؤال
What is Wired Equivalent Privacy (WEP)?

A)A method that is used to encrypt wireless communications in an 802.11 environment
B)A signal that jams other wireless devices attempting to access the system
C)A method to change encryption standards during a transmission
D)An encryption method used to secure bank passwords
سؤال
What is PKCS?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that used a 40 bit encryption key
سؤال
What is Certificate Authority?

A)A third party that issues digital certificates
B)A auditing firm that ensures encryption security
C)A certified professional that audits systems for security
D)A third party that encrypts information for people
سؤال
What is PKIX?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that uses a 40 bit encryption key
سؤال
The current version of S/MIME is version 2.
سؤال
The Certificate Authority is responsible for issuing,storing,and revoking certificates.
سؤال
The "S" in HTTPS signifies the protocol used when opening multiple web pages simultaneously.
سؤال
SSL provides secure connections for web transfers using encryption.
سؤال
PKI stands for _______________
سؤال
The _______________ protocol was introduced by Netscape as a means of providing secure connections between the client and server for exchanging information.
سؤال
The Certificate Management Protocol (CMP)defines the messages and operations required to provide certificate management services within the PKIX model.
سؤال
_______________ specifies the standard formats for public key certificates,certificate revocation lists,and attribute certificates.
سؤال
_______________ is composed of two parts: the TLS Record Protocol and the TLS Handshake protocol.
سؤال
_______________ provides a method for implementing a key exchange protocol and for negotiating a security policy.
سؤال
IPsec is short for the "second" version of IP.
سؤال
PKI stands for private key infrastructure.
سؤال
_______________ allows the encapsulation of one packet inside another to hide the original packet.
سؤال
The X.905 standard specifies formats for public key certificates.
سؤال
_______________ defines standards for interactions and operations for four component types: the user,certificate authority,registration authority,and the repository for certificates.
سؤال
_______________ is used to encrypt web traffic and uses port 443.
سؤال
A popular program used to encrypt and decrypt e-mail and files is _______________.
سؤال
_______________ is a message specification extension to the MIME standard,used to provide a way to send and receive signed and encrypted MIME data.
سؤال
PGP uses private key encryption for encrypting and decrypting e-mail.
سؤال
WEP uses public key encryption so it has secure wireless communications.
سؤال
How does PGP work?
سؤال
WEP is sometimes used to secure a wireless connection.What are the security issues related to WEP?
سؤال
List and define 5 of the 12 sections detailed by the ISO/IEC 27002 Standard.
سؤال
Briefly describe a public key infrastructure (PKI).
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Standards and Protocols
1
What is a certificate?

A)A certificate used to encrypt a message in PKI
B)A method of certifying the strength of an encryption key
C)A digital document that is used to verify the owner's identity
D)A certificate used in changing the key strength in PKI
C
2
What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability?

A)FES,Federal encryption standards
B)FIPS,Federal Information Processing Standards
C)FIRE,Federal information regulation enterprise
D)FIES,Federal information and encryption standards
B
3
What is IPsec?

A)A collection of IP security features designed to introduce security at the network or packet-processing layer
B)An application that encrypts e-mail
C)A standard setting group that dictates internet security standards
D)The company to first introduce the concept of encryption
A
4
WEP has all of the following weaknesses of EXCEPT:

A)The secret key is only 40 bits long.
B)It is susceptible to collision attacks.
C)Even the 128 bit version is vulnerable.
D)Many wireless implementations do not come with WEP enabled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the ISO 17799?

A)A standard for creating and implementing security policies
B)A standard for international encryption of e-mail
C)A document used to develop physical security for a building
D)A document describing the details of wireless encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is CMP?

A)This protocol defines the messages and operations required to provide certificate management services
B)An encryption protocol used to verify a key length
C)An application that decrypts encrypted e-mail
D)A common message protocol that is used in e-mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is XKMS?

A)Key Management Specification,which defines services to manage PKI operations within the Extensible Markup Language (XML)environment
B)An XML standard for e-mail encryption
C)A XML standard that used for wireless data exchange
D)A primary XML standard that is for application development
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
8
Pretty good privacy (or PGP)is

A)A privacy group that fights against the government
B)A common encryption method for e-mail
C)A password management system
D)A method of security an operating system kernel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
9
For products evaluated by Common Criteria,the highest level of assurance is

A)EAL 1
B)EAL 8
C)EAL 7
D)EAL 9
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
10
Certificates that should no longer be used due to compromise should be

A)Deleted
B)Moved to a different computer
C)Revoked
D)Removed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
11
HTTPS uses port

A)80
B)8080
C)443
D)433
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
12
What function does Tier 1of the XML protocol service,based on the client requests and application requirements,perform?

A)It locates the appropriate key information for the client
B)Performs a data validation on a portion of the key
C)Automatically updates the firewall installed on the user's computer
D)Updates the cryptographic algorithms for the S/MIME
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
13
PGP uses

A)Private key encryption
B)Asymmetric encryption
C)Symmetric encryption
D)Anomalous encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
14
What are the SSL and TLS used for?

A)A means of securing application programs on the system
B)To secure communication over the internet
C)A method to change from one form of PKI infrastructure to another
D)A secure way to reduce the amount of SPAM a system receives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which is the strongest implementation class of WTLS?

A)First class
B)Class 1
C)Class 2
D)Class 3
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is Internet Security Association and Key Management ISAKMP?

A)A method for implementing a key exchange protocol and for negotiating a security policy
B)The name of the a organization that creates the encryption keys
C)A protocol to encrypt e-mail
D)A program that creates random numbers used in encryption keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is Wired Equivalent Privacy (WEP)?

A)A method that is used to encrypt wireless communications in an 802.11 environment
B)A signal that jams other wireless devices attempting to access the system
C)A method to change encryption standards during a transmission
D)An encryption method used to secure bank passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is PKCS?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that used a 40 bit encryption key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is Certificate Authority?

A)A third party that issues digital certificates
B)A auditing firm that ensures encryption security
C)A certified professional that audits systems for security
D)A third party that encrypts information for people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is PKIX?

A)One of the standards used in implementing a public key infrastructure
B)A method of private cryptography used by the military
C)A method of encrypting e-mail from the IRS
D)The method of encryption that uses a 40 bit encryption key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
21
The current version of S/MIME is version 2.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
22
The Certificate Authority is responsible for issuing,storing,and revoking certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
23
The "S" in HTTPS signifies the protocol used when opening multiple web pages simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
24
SSL provides secure connections for web transfers using encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
25
PKI stands for _______________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
26
The _______________ protocol was introduced by Netscape as a means of providing secure connections between the client and server for exchanging information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
27
The Certificate Management Protocol (CMP)defines the messages and operations required to provide certificate management services within the PKIX model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
28
_______________ specifies the standard formats for public key certificates,certificate revocation lists,and attribute certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
29
_______________ is composed of two parts: the TLS Record Protocol and the TLS Handshake protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
30
_______________ provides a method for implementing a key exchange protocol and for negotiating a security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
31
IPsec is short for the "second" version of IP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
32
PKI stands for private key infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
33
_______________ allows the encapsulation of one packet inside another to hide the original packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
34
The X.905 standard specifies formats for public key certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
35
_______________ defines standards for interactions and operations for four component types: the user,certificate authority,registration authority,and the repository for certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
36
_______________ is used to encrypt web traffic and uses port 443.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
37
A popular program used to encrypt and decrypt e-mail and files is _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
38
_______________ is a message specification extension to the MIME standard,used to provide a way to send and receive signed and encrypted MIME data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
39
PGP uses private key encryption for encrypting and decrypting e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
40
WEP uses public key encryption so it has secure wireless communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
41
How does PGP work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
42
WEP is sometimes used to secure a wireless connection.What are the security issues related to WEP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
43
List and define 5 of the 12 sections detailed by the ISO/IEC 27002 Standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly describe a public key infrastructure (PKI).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.