Search Header Logo

Net security Chap 6

Computers

University

Used 5+ times

Net security Chap 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol. 

false
true

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At what stage can a certificate no longer be used for any type of authentication? 

lost confidentiality
expiration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs? 

bridge trust
third party

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is IPsec considered to be a transparent security protocol? ​ 

IPsec is designed to require modifications of programs, or additional training, or additional client setup
IPsec is designed to not require modifications of programs, or additional training, or additional client setup

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital certificates cannot be used to identify objects other than users. 

False
True

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol below supports two encryption modes: transport and tunnel? 

RSA
GPG
IPsec

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for an organization that receives, authenticates, and processes certificate revocation requests? 

Registration Authority
distributed trust
Certificate practice statement (CPS)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?