QUESTION 19
A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations.
2 points
QUESTION 20
Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate.
2 points
QUESTION 21
Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH and ESP. This is done by providing a method for two hosts to decide upon a shared secret key without transmitting it.
2 points
QUESTION 22
Consider the two Caesar ciphers, C1 and C2, below.
Plaintext letter: a b c d e f g h i j k l m n o p q r s t u v w x y z C1 (k=5): f g h i j k l m n o p q r s t u v w x y z a b c d e C2 (k=19): t u v w x y z a b c d e f g h i j k l m n o p q r s
Use these ciphers in the repeating pattern C2, C1, C1, C2 to encrypt the following word:
cyber
4 points
QUESTION 23
Which of the following are stream ciphers?
DES |
||
3DES |
||
AES |
||
RC4 |
4 points
QUESTION 24
Which of the following is used to sign a certificate created by a CA?
a. |
CA's public key |
|
b. |
CA's private key |
|
c. |
CA's digital signature |
|
d. |
CA's certificate |
4 points
QUESTION 25
Bob wants to send a private message to Alice, so he encrypts the message with
a. |
Alice's private key |
|
b. |
Alice's public key |
|
c. |
Bob's private key |
|
d. |
Bob's public key |
Solution
19)
Keyberos
20)
Single Sign On(SSO)
21)
Internet Key Exchange(IKE)
22)
vdgxk
Explanation
22)
c |
y |
b |
e |
r |
C2 |
C1 |
C1 |
C1 |
C2 |
v |
d |
g |
x |
k |
--
all the best
please upvote
Get Answers For Free
Most questions answered within 1 hours.