Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

_Network Security Exam 2

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show permanent key  
🗑
show subkey  
🗑
show lifetime  
🗑
A __________ is a set of managed nodes that share the same Kerberos database which resides on the Kerberos master computer system that is located in a physically secure room.   show
🗑
show ticket-granting  
🗑
show Kerberos principal  
🗑
A random value to be repeated to assure that the response is fresh and has not been replayed by an opponent is the __________ .   show
🗑
An __________ manages the creation and maintenance of attributes such as passwords and biometric information.   show
🗑
show signature  
🗑
show PCBC  
🗑
show timestamp  
🗑
show ticket granting  
🗑
show IP address  
🗑
show ticket  
🗑
show Kerberos  
🗑
The _________ exentsion is used only in certificates for CAs issued by other CAs and allows an issuing CA to indicate that one or more of that issuer's policies can be considered equivalent to another policy used in the subject CAs domain.   show
🗑
The _________ extension lists policies that the certificate is recognized as supporting, together with optional qualifier information.   show
🗑
The __________ knows the passwords of all users and stores these in a centralized database and also shares a unique secret key with each server   show
🗑
show key distribution  
🗑
The technical deficiencies of Kerberos version 4 are: double encryption, PCBC encryption, session keys and __________ .   show
🗑
show X.509  
🗑
When two end systems wish to communicate they establish a logical connection and, for the duration of that logical connection, all user data are encrypted with a one-time __________ which is destroyed at the end of the session.   show
🗑
_________ are entities that obtain and employ data maintained and provided by identity and attribute providers, which are often used to support authorization decisions and to collect audit information.   show
🗑
__________ defines a framework for the provision of authentication services by the X.500 directory to its users and defines alternative authentication protocols based on the use of public-key certificates.   show
🗑
show Identity management  
🗑
show Federation  
🗑
show deck  
🗑
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.   show
🗑
show secure key delivery  
🗑
show 4-way handshake  
🗑
show PTK  
🗑
show gateway  
🗑
show EAPOL-KEK  
🗑
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.   show
🗑
The __________ is the information that is delivered as a unit between MAC users.   show
🗑
The __________ is used to convey WTLS-related alerts to the peer entity.   show
🗑
show logical link control  
🗑
The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium.   show
🗑
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .   show
🗑
show AAA  
🗑
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.   show
🗑
The specification of a protocol along with the chosen key length is known as a __________ .   show
🗑
show Wi-Fi  
🗑
WAP security is primarily provided by the __________ which provides security services between the mobile device and the WAP gateway to the Internet.   show
🗑
show WAP  
🗑
was designed to describe content and format for presenting data on devices with limited bandwidth, limited screen size, and limited user input capability and to work with telephone keypads/styluses, and other input devices common to mobile, wireless comm.   show
🗑
show distribution  
🗑
__________ specifies security standards for IEEE 802.11 LANs including authentication, data integrity, data confidentiality, and key management.   show
🗑
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer, which is then encoded using base64 encoding.   show
🗑
Computed by PGP, a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user; the higher the level of trust, the stronger the binding of this user ID to this key.   show
🗑
show Class 3  
🗑
show multipart/parallel  
🗑
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.   show
🗑
show RFC 5322  
🗑
show passphrase-based  
🗑
show digital signatures  
🗑
PGP provides compression using the __________ algorithm.   show
🗑
PGP provides e-mail compatibility using the __________ encoding scheme   show
🗑
S/MIME cryptographic algorithms use __________ to specify requirement level   show
🗑
show Content-Description  
🗑
show Mail Submission Agent  
🗑
show quoted-printable  
🗑
The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs   show
🗑
show application  
🗑
show Content-ID  
🗑
show Content-Type  
🗑
The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication   show
🗑
The __________ subtype is used when the different parts are independent but are to be transmitted together. They should be presented to the receiver in the order that they appear in the mail message   show
🗑
show trust flag byte  
🗑
To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII string using _________ conversion   show
🗑
Typically housed in the user's computer, a _________ is referred to as a client e-mail program or a local network e-mail server.   show
🗑
show MPEG  
🗑
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.   show
🗑
A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.   show
🗑
show replay  
🗑
A value chosen by the responder to identify a unique IKE SA is a _________ .   show
🗑
At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity   show
🗑
show transport mode  
🗑
show tunnel mode  
🗑
show HMAC  
🗑
IKE key determination employs __________ to ensure against replay attacks   show
🗑
show confidentiality  
🗑
IPsec provides security services at the ________ layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys required to provide the requested services   show
🗑
show confidentiality  
🗑
The _________ payload allows peers to identify packet flows for processing by IPsec services   show
🗑
The __________ facility is concerned with the secure exchange of keys.   show
🗑
The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.   show
🗑
show Notify  
🗑
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .   show
🗑
show SPD  
🗑
show local IP address  
🗑
Three different authentication methods can be used with IKE key determination: Public key encryption, symmetric key encryption, and _________ .   show
🗑
_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication. The current specification is RFC 4303.   show
🗑
show IKE  
🗑
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.   show
🗑
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.   show
🗑
show IPsec  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: ITSec_guy
Popular Computers sets