
Net security Chap 6
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
false
true
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At what stage can a certificate no longer be used for any type of authentication?
lost confidentiality
expiration
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
bridge trust
third party
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is IPsec considered to be a transparent security protocol?
IPsec is designed to require modifications of programs, or additional training, or additional client setup
IPsec is designed to not require modifications of programs, or additional training, or additional client setup
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital certificates cannot be used to identify objects other than users.
False
True
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What protocol below supports two encryption modes: transport and tunnel?
RSA
GPG
IPsec
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?
Registration Authority
distributed trust
Certificate practice statement (CPS)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?