A) integrity and authenticity
B) integrity and non-repudiation
C) authenticity and privacy
D) confidentiality and integrity
Correct Answer
verified
Multiple Choice
A) ipsec
B) https
C) smtp
D) s/mime
Correct Answer
verified
Multiple Choice
A) public announcement
B) publicly available directory
C) public key authority
D) public key certificate
Correct Answer
verified
Multiple Choice
A) browser security
B) email security
C) wifi security
D) ftp security
Correct Answer
verified
Multiple Choice
A) ssl
B) httpl
C) smtp
D) sftp
Correct Answer
verified
Multiple Choice
A) set electronic transaction
B) secure electronic transaction
C) simple electronic transaction
D) none of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) rsa
B) aes
C) des
D) robin
Correct Answer
verified
Multiple Choice
A) pretty good privacy
B) pretty good policy
C) policy good privacy
D) pretty good protection
Correct Answer
verified
Multiple Choice
A) entire ip packet
B) ip header
C) ip payload
D) ip trailer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) denial-of-service attack
B) virus attack
C) worms attack
D) botnet process
Correct Answer
verified
Multiple Choice
A) 4
B) 3
C) 2
D) 5
Correct Answer
verified
Multiple Choice
A) (p) /(q)
B) (p) (q)
C) (p-1) (q-1)
D) (p+1) (q+1)
Correct Answer
verified
Multiple Choice
A) message authentication
B) digital signature
C) both a and b
D) only a
Correct Answer
verified
Multiple Choice
A) elliptic curve cryptography
B) elliptic cryptography curve
C) error correcting code
D) none of the above
Correct Answer
verified
Multiple Choice
A) asymmetric key cryptography
B) symmetric key cryptography
C) elliptic curve cryptography
D) all of the above
Correct Answer
verified
Multiple Choice
A) 3
B) 2
C) 4
D) 5
Correct Answer
verified
Multiple Choice
A) key exchange algorithm
B) key agreement algorithm
C) only a
D) both a and b
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 22
Related Exams