CS356 Final (All Solved 100%)
The most complex part of SSL is the __________ . -message header -payload -handshake protocol -TLS correct answers Handshake Protocol A benefit of IPsec is __________. A. that it is below the transport layer and transparentto applications B. there is no need to revoke keying material whenusers leave the organization C. it can provide security for individual users if needed D. all of the above correct answers All of the above The _______ field in the outer IP header indicates whether the association is an AH or ESP security association. A. protocol identifier B. security parameter index C. IP destination address D. sequence path counter correct answers protocol identifier In the case of ________ only the digital signature is encoded using base64. A. enveloped data B. signed and enveloped data C. signed data D. clear-signed data correct answers D. clear-signed data IPsec can assure that _________. A. a router advertisement comes from an authorizedrouter B. a routing update is not forged C. a redirect message comes from the router to whichthe initial packet was sent D. all of the above correct answers D. all of the above In S/MIME each conventional key is used a total of three times. correct answers False DKIM has been widely adopted by a range of e-mail providers and many Internet service providers. correct answers True A message store cannot be located on the same machine as the MUA correct answers False An ADMD is an Internet e-mail provider. correct answers True MIME is an extension to the old RFC 822 specification of an Internet mail format. correct answers True _______ is a list that contains the combinations of cryptographic algorithms supported by the client. A. Compression method B. Session ID C. CipherSuite D. All of the above correct answers C. CipherSuite To protect the data, either the signature alone or the signature plus the message are mapped into printable ASCII characters using a scheme known as ________ or base64mapping. A. radix-64 B. ASCII-64 C. ESP-64 D. safe mapping correct answers A. radix-64 Recipients without S/MIME capability can view the message content, although they cannot verify the signature correct answers True SMTP is used between the message user agent and the mail submission agent correct answers True The IAB included authentication and encryption as necessary security features in IPv6 correct answers True The recipient of a message can decrypt the signature using DSS and the sender's public DSS key correct answers True The ________ function consists of encrypted content of any type and encrypted-content encryption keys for one or more recipients. A. clear-signed data B. signed data C. enveloped data D. signed and enveloped data correct answers C. enveloped data The ________ accepts the message submitted by a message user agent and enforces the policies of the hosting domain and the requirements of Internet standards. A. mail submission agent B. message user agent C. mail delivery agent
Written for
- Institution
- CS356
- Course
- CS356
Document information
- Uploaded on
- June 19, 2023
- Number of pages
- 20
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
the most complex part of ssl is the