CEH: Ch. 3

Exit

Question 1 of 1

  Time Left


0 [{"id":412471,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following best describes PGP?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"PGP is a method of encrypting stored data to include emails, stored data, and other similar information. It is a form of public and private key encryption.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412469,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"What does hashing preserve in relation to data?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Hashing is intended to verify and preserve the integrity of data, but it cannot preserve the confidentiality of that data.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412474,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"In IPsec, encryption and other processes happen at which layer of the OSI model?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"IPsec operates at the Network layer, or Layer 3, of the OSI model, unlike many previous techniques.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412468,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Symmetric key systems have key distribution problems due to __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"The number of keys increases dramatically with more and more parties using symmetric encryption; hence it does not scale well.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412463,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Asymmetric encryption is also referred to as which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Asymmetric encryption uses two separate keys and is referred to as public key cryptography. Symmetric algorithms use only one key that is used by both the sender and receiver.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412462,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following manages digital certificates?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"A certificate authority is responsible for issuing and managing digital certificates as well as keys.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412467,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"A public key is stored on the local computer by its owner in a __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"A public key is not necessarily stored on the local system, but a private key will always be present if the user is enrolled.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412465,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"A message digest is a product of which kind of algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"A message digest is a product of a hashing algorithm, which may also be called a message digest function.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412475,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"In IPsec, what does Authentication Header (AH) provide?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"The Authentication Header provides authentication services to data, meaning that the sender of the data can be authenticated by the receiver of the data.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412472,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"SSL is a mechanism for which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"SSL is used to secure data when it is being transmitted from client to server and back. The system is supported by most clients, including web browsers and email clients.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412461,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Symmetric cryptography is also known as __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"Symmetric cryptography is also known as shared key cryptography.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412464,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following best describes hashing?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"Hashing is referred to as a cipher or algorithm or even a cryptosystem, but it can be uniquely referred to as a nonreversible mechanism for verifying the integrity of data. Remember that hashing doesn\u2019t enforce confidentiality.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412466,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"A public and private key system differs from symmetric because it uses which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"A public and private key are mathematically related keys, but they are not identical. In symmetric systems only one key is used at a time.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412473,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which system does SSL use to function?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"PKI is used in the process of making SSL function. While it is true that AES, DES, and 3DES can be used in SSL connections, PKI is the only one used consistently in all situations.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412470,"quiz_id":"20976","answer_id":null,"answerType_id":"0","created_at":"2018-03-22 00:16:38","updated_at":"2018-03-22 00:18:07","questionName":"Which of the following is a common hashing protocol?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"MD5 is the most widely used hashing algorithm, followed very closely by SHA1 and the SHA family of protocols.","question_score_id":null,"lang":null,"questionAudioPath":null}]
412471
0
60
block

Which of the following best describes PGP?

Select the Correct Answers  

(0/0)












412469
0
60
none
412474
0
60
none
412468
0
60
none
412463
0
60
none
412462
0
60
none
412467
0
60
none
412465
0
60
none
412475
0
60
none
412472
0
60
none
412461
0
60
none
412464
0
60
none
412466
0
60
none
412473
0
60
none
412470
0
60
none