The Secure Hash Algorithm (SHA-1) creates:
Which of the following statements is most accurate regarding a digital signature?
What algorithm has been selected as the AES algorithm, replacing the DES algorithm?
In a Public Key Infrastructure, how are public keys published?
Which of the following is defined as a key establishment protocol based on the Diffie-Hellman algorithm proposed for IPsec but superseded by IKE?
What level of assurance for a digital certificate verifies a user's name, address, social security number, and other information against a credit bureau database?
Which of the following is NOT an asymmetric key algorithm?
Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI model?
Which of the following keys has the SHORTEST lifespan?
Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?
What is the primary role of smartcards in a PKI?
What is the main problem of the renewal of a root CA certificate?
Which type of encryption is considered to be unbreakable if the stream is truly random and is as large as the plaintext and never reused in whole or part?
Which of the following offers confidentiality to an e-mail message?
What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?
Which of the following statements pertaining to Secure Sockets Layer (SSL) is false?
The DES algorithm is an example of what type of cryptography?
The Clipper Chip utilizes which concept in public key cryptography?
What is the effective key size of DES?
What is the RESULT of a hash algorithm being applied to a message ?