Comp TIA Security+ Guide to Network Fundamentals - EOC Ch. 7 PDF

Title Comp TIA Security+ Guide to Network Fundamentals - EOC Ch. 7
Author Rachel Brener
Course Network Security Fundamentals
Institution Florida Gulf Coast University
Pages 1
File Size 71.6 KB
File Type PDF
Total Downloads 29
Total Views 136

Summary

Comp TIA Security+ Guide to Network Fundamentals - EOC Ch. 7...


Description

CHAPTER 7 Which is an IPsec protocol that authenticates that packets Authentication Header (AH) received were sent from the source? What is the name of the fields in an X.509 digital Certificate attributes certificate that are used when the parties negotiate a secure connection? Crypto service provider What entity calls in crypto modules to perform cryptographic tasks? Session keys ____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. What is the name of the device protected by a digital certificate? Digital certificate What is the strongest technology that would assure Alice that Bob is the sender of a message? The user's identity with his public key Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say? Which of the following can a digital certificate NOT be To verify the authenticity of the CA used for? Who verifies the authenticity of a CSR? CA (Certificate Authority) Certificate Repository (CR) A centralized directory of digital certificates is a(n)_ Online Certificate Status Protocol (OCSP) Elton needs his application to perform a real-time lookup of a digital certificate’s status. Which technology would he use? What is the purpose of certificate changing? Which of the following is NOT a means by which a newly OS Updates approved root digital certificate is distributed? Cipher Block Chaining (CBC) Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged? The web server verifies the server certificate. Which is the first step in a key exchange? What is the file extension for a Cryptographic Message .P7B Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption? Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need? ESP How is confidentiality achieved through IPsec? Which refers to a situation in which keys are managed by Key escrow a third party, such as a trusted CA? Secure Shell (SSH) Which is a protocol for securely accessing a remote computer in order to issue a command?...


Similar Free PDFs