Protocoale
The Record Protocol within SSL provides:
Transaction’s non-repudiation
Message confidentiality
Message integrity
Authentication of entities
S/MIME provides protection against:
Unauthorized message alteration
E-mail addresses substitution
Virus multiplication
Denial-of-service attacks
Which of the following protocols can be used for the centralized management of users’ credentials?
RADIUS
ICMP
ARP
TCACS+
LDAP
Which are the main advantages of virtual private networks (VPN) in comparison with frame relay based networks, leased lines or dial-up?
Lower installation and operation costs
Increasing security level
Higher availability for network services
Higher transfer rates
The “data tunneling” expression, specific to VPNs it refers to:
Method used by system administrators for detecting possible network intrusions
A mechanism which allow data to pass through firewall systems
Optional feature which activated, increases the network performances
Packet encapsulation in other packages belonging to a different protocol in order to create a virtual circuit
Which is the SSL protocol used for entities authentication and the negotiation of algorithms and cryptographic keys:
Change Cipher SpecProtocol
Internet Key Exchange
Record Protocol
Handshake Protocol
Who developed the X.509 standard, describing the digital certificates syntax?
International Telecommunication Union (ITU)
Internet Engineering Task Force (IETF)
International Standards Organization (ISO)
RSA Laboratories
How is the session key generated within the Diffie Helman protocol?
The session key is generated by exchanging random values between transmitter and recipient and the use of an algorithm whose security is based on the impossibility of calculating discrete logarithms
The session key is randomly generated by the transmitter and sent encrypted to the recipient
The session key is generated by a third trustful party
The session key is generated simultaneously by transmitter and recipient using a time based algorithm
In which of the following authentication protocols mentioned below, the password is transmitted in clear through the network?
Password Authentication Procedure (PAP)
Kerberos
Challenge-Handshake Authentication Protocol (CHAP)
Windows NT LAN Manager (NTLM)
Kerberos is efficient against the following:
Dictionary attacks
Repetition attacks
Denial-of service attacks
Social engineering
Which of the following technologies uses two factors for the authentication of its users?
SAKMP/Oakley
NTLM
LDAP
RSA SecurID
The Encapsulating Security Payload (ESP) protocol within IPSec provides:
Data origin authentication
Data integrity
Data confidentiality
Data non-repudiation transfer
Which of the following sentences about the standard PKCS #7 are true?
It uses the ASN.1 language for describing the data structures
It specifies the syntax for cryptographic messages
It became outdated, being replaced by the PKCS #8 standard
Have been developed by the Internet Engineering Task Force (IETF)
Which of the following affirmations about the SSL protocol are true?
It uses digital certificates for parties authentication
Is a third level protocol
It can only be used for securing the web traffic
It requires changing the TCP/IP stack
Which of the following affirmations about the Kerberos protocol are true?
It represents the main authentication mechanism in Windows 2000/2003/2008 domains
Has been developed by RSA Security corporation
Has been developed by RSA Security corporation
Is time dependent
Which of the following organizations deals with the standardization of electronic signature at European level?
ETSI ESI
ISO/IEC
PC/SC
CEN/ISSS
{"name":"Protocoale", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on secure communication protocols with this engaging quiz. Dive into the world of SSL, S\/MIME, VPNs, and more!20 challenging questionsMultiple-choice formatLearn about the latest in network security","img":"https:/images/course1.png"}