Front | Back |
____ is a block cipher that processes blocks of 64 bits.
a. SHA-1 b. RC4 c. RC2 d. MD5
|
RC2
|
____ encryption uses two keys instead of one. These keys are mathematically related and are known as the public key and the private key.
a. Asymmetric b. Symmetric c. Private d. Open
|
Asymmetric
|
A similar program known as ____ is a PGP open-source product.
a. FreePGP b. GPG c. PGPx d. PGPnix
|
GPG
|
Microsoft’s ____ is a cryptography system for Windows operating systems that use the Windows NTFS file system.
a. GPG b. AES c. PGP d. EFS
|
AES
|
To protect data stored on a hard drive, Microsoft Windows Vista includes ____ drive encryption.
a. IDEA b. TPM c. BitLocker d. AES
|
BitLocker
|
____ digital certificates are often issued from a Web server to a client, although they can be distributed by any type of server, such as a mail server.
a. Software publisher b. Server c. Personal d. Organizational
|
Personal
|
In one type of trust model, ____ trust, a relationship exists between two individuals because one person knows the other person.
a. indirect b. third-party c. discrete d. direct
|
direct
|
The ____ trust model assigns a single hierarchy with one master CA called the root.
a. web of b. hierarchical c. direct d. third-party
|
hierarchical
|
The TLS ____ Protocol allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.
a. Handshake b. Record c. Transport d. Packing
|
Handshake
|
Is actually a suite of three utilities—slogin, scp, and ssh—that are secure versions of the unsecure UNIX counterpart utilities rlogin, rcp, and rsh.
a. SSH b. TLS c. SSL d. SFTP
|
SSH
|
One variation of PPP that is used by broadband Internet providers with DSL or cable modem connections is ____.
|
a. TLS b. LCP c. PPPoE d. PPTP
|
____ fire suppression systems do not harm people, documents, or electrical equipment in the room.
|
a. Water sprinkler b. Clean sprinkler c. Clean agent d. Dry chemical
|
RAID Level 5 distributes ____ data (a type of error checking) across all drives instead of using a separate drive to hold the parity error checking information.
|
a. mirroring b. stripping c. segmenting d. parity
|
A ____ site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity.
|
a. hot b. warm c. cold d. cool
|
The ____ is simply the length of time it will take to recover the data that has been backed up.
|
a. D2D2T b. RPO c. RTO d. D2D
|