UVC2 STUDY MATERIAL.docx

B yes because it will entirely eliminate key

Info icon This preview shows pages 18–20. Sign up to view the full content.

B. Yes, because it will entirely eliminate key collisions. C. No, because it could eventually result in an invalid key length. D. No, because it could shorten the time required for successful brute force attack. 55. In a key distribution center, which items must have special arrangements to be securely distributed over the key distribution centers? A. Application data - The 'Application Data folder' is a special folder that is only accessible by your application. Its content is hidden from the user, and from other apps. Despite being hidden from the user, the Application Data folder is stored on the user's Drive and therefore uses the user's Drive storage quota B. Master keys - C. Session keys - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Session keys are sometimes called symmetric keys, because the same key is used for both encryption and decryption. D. Session key requests 56. Which element and an X.509 certificate is encrypted? A. The message digest - A message digest is a cryptographic hash function containing a string of digits created by a one-way hashing formula. Message digests are designed to protect the integrity of a piece of data or media to detect changes and alterations to any part of a message. B. The registration authorities information. C. The subject's public key. D. The certificate authorities information. 57. A security administrators considering how to distribute issued X.509 user certificates. What factors needed to transmit the user certificate? A. The certificate can be encrypted using a public key. B. The certificate must be transmitted over a trusted network. C. The certificate can be distributed using clear text. D. The certificate can be digitally signed.
Image of page 18

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

58. Corporate security periodically reissued certificate authority (CA) certificates from a very secure key pair. The private key can only be rebuilt when security administrators on both sides of the country come together with their pieces. Which key management practice does this example represent? A. Split knowledge. B. Traveling key pair. C. Large key space. D. Dual control knowledge 59. A security administrator needs to set up a public key distribution system for securing email. What is the most scalable and standard way of achieving this goal? A. Using public directory - B. Using public-key cryptography. C. Using public key authority. D. Using X.509 nine certificates. 60. A network administrator for a large company has decided to set up a PKI to distribute public keys among users. Private keys are unencrypted but are on a CD in the administrator's desk. What should the administrator due to increase the security of his PKI? A. Secure the private keys. B. Eliminate the PKI. C. Choose media other than CDs. D. Do not back up the private keys. 61. An application designer needs a way of having keys distributed, updated, and revoked without custom building all those features. Which key system should the designer use?
Image of page 19
Image of page 20
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern