Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network Security Essentials
Quiz 6: Transport-Level Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Unlike traditional publishing environments, the Internet is three- way and vulnerable to attacks on the Web servers.
Question 2
True/False
Sessions are used to avoid the expensive negotiation of new security parameters for each connection that shares security parameters.
Question 3
True/False
The Change Cipher Spec Protocol is one of the three SSL-specific protocols that use the SSL Record Protocol.
Question 4
True/False
One way to classify Web security threats is in terms of the location of the threat: Web server, Web browser, and network traffic between browser and server.
Question 5
True/False
The TLS Record Format is the same as that of the SSL Record Format.
Question 6
True/False
The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange.
Question 7
Short Answer
The _________ Protocol allows the server and client to authenticate each other and to negotiate an encryption and MAC algorithm along with cryptographic keys to be used to protect data sent in an SSL Record.
Question 8
True/False
The first element of the CipherSuite parameter is the key exchange method.
Question 9
True/False
Server authentication occurs at the transport layer, based on the server possessing a public/private key pair.
Question 10
True/False
The encryption of the compressed message plus the MAC must increase the content length by more than 1024 bytes.
Question 11
Short Answer
The _________ takes an application message to be transmitted, fragments the data into manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit in a TCP segment.