CIS
UVC2 STUDY MATERIAL.docx

B peer x509 certificate in cryptography x509 is an

Info icon This preview shows pages 4–6. Sign up to view the full content.

B. Peer X509 certificate - In cryptography, X.509 is an important standard for a public key infrastructure (PKI) to manage digital certificates and public-key encryption and a key part of the Transport Layer Security protocol used to secure web and email communication. An ITU-T standard, X.509 specifies formats for public key certificates, A certificate chain (see the equivalent concept of "certification path" defined ... C. Server random Nonce is randomly generated by the party that introduces it into the conversation. It's crucial that an attacker cannot influence the choice of the nonce, and sometimes that the attacker can't predict that choice. It's quite typical that each party
Image of page 4

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

generates at least once nonce in a run of a distributed protocol - There are protocols where a nonce is kept secret. A session key can be both a nonce (i.e., chosen randomly by one participant) and a secret (i.e. not transmitted directly over the wire). In fact, in a well-designed protocol, a session key is often derived from two Nonce, once coming from each party. But being secret is not a defining property of Nonce D. Client random nonce - is an arbitrary number used only once in a cryptographic communication, in the spirit of a nonce word. They are often random or pseudo-random numbers. Many nonce also include a timestamp to ensure exact timeliness, though this requires clock synchronization between organizations. 10. Which SSL protocol is responsible for fragmenting upper layer messages in computing the message authentication code (MAC)? A. Connectionless protocol - A connectionless protocol describes the communication between two network end points where a message is sent from one end point to another without a prior arrangement. At one end, the device transmits data to the other before ensuring that the device on the other end is ready to use. This describes most transmissions on the open internet. Some protocols allow for error correction by requesting a retransmission if necessary B. Alert protocol - The Common Alerting Protocol (CAP) is a digital format for exchanging emergency alerts that allows a consistent alert message to be disseminated simultaneously over many different communications systems. FEMA worked with the Organization for the Advancement of Structured Information Standards (OASIS) to develop a standardized international technical data profile that defines a specific way of using the standard for the purposes of the Integrated Public Alert and Warning System (IPAWS). C. Transport protocol. - In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI). The protocols of the layer provide host-to-host communication services for applications.
Image of page 5
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern