What concept of PKI – Public Key Infrastructure will im…
You are an information systems security officer at a mid-sized business and are called upon to investigate a
threat conveyed in an email from one employee to another.
You gather the evidence from both the email server transaction logs and from the computers of the two
individuals involved in the incident and prepare an executive summary.
You find that a threat was sent from one user to the other in a digitally signed email. The sender of the threat
says he didn’t send the email in question.
What concept of PKI – Public Key Infrastructure will implicate the sender?
What happens to the certificates contained on the smart…
Suppose that you are the COMSEC – Communications Security custodian for a large, multinational corporation.
Susie, from Finance approaches you in the break room saying that she lost her smart ID card that she uses to
digitally sign and encrypt emails in the PKI.What happens to the certificates contained on the smart card after the security officer takes appropriate action?
What would you call a microchip installed on the mother…
What would you call a microchip installed on the motherboard of modern computers and is dedicated to
carrying out security functions that involve the storage and processing of symmetric and asymmetric keys,
hashes, and digital certificates.
which of the following Standard?
Public key infrastructure (PKI) consists of programs, data formats, procedures, communication protocols,
security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a
wide range of dispersed people to communicate in a secure and predictable fashion.
This infrastructure is based upon which of the following Standard?
Readable is to unreadable just as plain text is to:
Readable is to unreadable just as plain text is to:
A message can be encrypted, which provides:
Complete the following sentence. A message can be encrypted, which provides:
Which of the following is NOT an example of an asymmetr…
Which of the following is NOT an example of an asymmetric key algorithm?
A digital signature is a:
Complete the following sentence. A digital signature is a:
Which of the following is a Hashing Algorithm?
Which of the following is a Hashing Algorithm?
Which of the following modes of DES is MOST likely used…
Which of the following modes of DES is MOST likely used for Database Encryption?