72 an x509 v3 certificate binds an which uniquely

This preview shows page 5 - 7 out of 12 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
CompTIA Security+ Guide to Network Security Fundamentals
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 7
CompTIA Security+ Guide to Network Security Fundamentals
Ciampa
Expert Verified
____72.An X.509 v3 certificate binds a(n) _____, which uniquely identifies a certificate entity, to a user’s public key.a.message digestc.distinguished nameb.fingerprintd.digital signature
____73.The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
____74.____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.
75.____ is an open source protocol to secure communications across any IP-based network such as LANs, WANs, and the Internet.
SET____76.Digital signatures should be created using processes and products that are based on the ____.a.DSSc.SSLb.NISTd.HTTPS
____77.The ____ protocol provides system to system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.
____78.____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.
____79.____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
____80.In a(n) ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information.a.replayc.correlationb.timingd.dictionary
CompletionComplete each statement.81.The science of encryption is known as ____________________.82.____________________ is the process of making and using codes to secure the transmission of information.83.____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.84.To ____________________ means to encrypt or convert plaintext into the equivalent ciphertext.
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
CompTIA Security+ Guide to Network Security Fundamentals
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 7
CompTIA Security+ Guide to Network Security Fundamentals
Ciampa
Expert Verified
85.The process of hiding messages is called ____________________.86.When using a(n) ____________________ cipher, you replace one value with another.87.A(n) ____________________ substitution uses one alphabet.88.The ____________________ cipher simply rearranges the values within a block to create the ciphertext.89.The ____________________ OR operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.90.Also known as the one-time pad, the ____________________ cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.91.The message ____________________ is a fingerprint of the author’s message that is to be compared with the receiver’s locally calculated hash of the same message.92.Hashing functions do not require the use of keys, but it is possible to attach a message ____________________ code.93.The Secure ____________________ Standard is a standard issued by the National Institute of Standards and Technology.94.One of the most widely known cryptographic algorithms is the Data ____________________ Standard, which was developed by IBM and is based on the company’s Lucifer algorithm.95.The successor to 3DES is the ____________________ Encryption Standard.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture