Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 4:  Basics of Cryptography (Domain 4.0; 15%)

Previous Topic/Section
4.6  Summary
Previous Page
Pages in Current Topic/Section
1
Next Page
4.8  Success Answers
Next Topic/Section

4.7  Success Questions

1. The main role of a cryptographic hash function is in the provision of:

A. Message integrity checks and digital signatures

B. Message integrity checks only

C. Digital signatures only

D. Signature algorithm computations

 

2. What is used to allow verification of the claim that a specific public key does in fact belong to a specific individual?

A. Certificate

B. Key ring

C. SA

D. Ticket

 

3. To protect the data while in transit on a network, what is used to identify errors and omissions in the information?

A. Record sequence checking

B. Transmission error correction

C. Retransmission controls

D. Hash total

 

4. A digital certificate contains what data? (choose all that apply)

A. A subject name, which identifies the person or object that the certificate represents.

B. The public key belonging to the subject.

C. The identity of a Certificate Authority (CA) that has signed the certificate to certify that the public key and the identity both belong to the subject.

D. The digital signature of the named CA.

E. An expiration date for the Certificate

 

5. From the list, select the symmetric algorithms

A. DES

B. RC4

C. IPSec

D. PGP

E. IDEA

 

6. A digitally signed message offers

A. Authentication of Origin

B. Integrity of Data

C. Non-Repudiation

D. Confidentiality

 

7. The definition of a Certificate Policy is

A. Found in US Title Code (Federal law)

B. Determined by the CA

C. Both choices are correct

D. No choice is correct

 

8. What does CPS mean?

A. Cycles Per Second

B. Certificate Practice Statements

C. Certificate Policy Statements

D. Certificate Procedure Statements

E. No choice is correct

 

9. Certificate Revoking is based on

A. Policy

B. Expiration date

C. Administrator action

D. No choice is correct

E. Some choices are correct

 

10. Select the protocol that is utilized for management and negotiation of SA's.

A. MD5

B. RC3

C. ISAKMP

D. IDEL


Previous Topic/Section
4.6  Summary
Previous Page
Pages in Current Topic/Section
1
Next Page
4.8  Success Answers
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.