Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to Operating Systems Security
Quiz 3: Security Through Authentication and Encryption
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Which of the following cipher command-line parameters decrypts the contents of the specified folder and sets the folder so that any files added to the folder are not encrypted?
Question 22
Multiple Choice
What type of encryption is used for remote connections into Windows 2000 Server and Windows Server 2003?
Question 23
Multiple Choice
What needs to be installed in order for Windows 95 and Windows 98 to use NTLM v2?
Question 24
Multiple Choice
Which version of hashing algorithm takes 8-bit (one-byte) chunks and creates an encrypted message that is padded until its length can be divided by 16?
Question 25
Multiple Choice
When was the RSA encryption method created?
Question 26
Multiple Choice
Which of the following sniffer application can be used in Windows-based operating systems?
Question 27
Multiple Choice
Which of the following cipher command-line parameters provides the account employing cipher with a new encryption key?
Question 28
Multiple Choice
Which of the following encryption algorithms is considered to be the most secure?
Question 29
Multiple Choice
Which of the following cipher command-line parameters copies encryption key and certificate data to a file that is encrypted for use by the cipher user?
Question 30
Multiple Choice
_____ is an authenticating server for EAP.
Question 31
Multiple Choice
What encryption method does Red Hat Linux use by default?
Question 32
Multiple Choice
_____ is the use of a secret code or other means to disguise data that is stored on a computer or transported across a network.
Question 33
Multiple Choice
What command can be used from the command prompt window to configure EFS?
Question 34
Multiple Choice
Which of the following operating systems recognizes the original NTLM logon authentication?
Question 35
Multiple Choice
What is the RSA key size used by MPPE when it is configured for strongest encryption?
Question 36
Multiple Choice
Which of the following encryption techniques is employed in UNIX/Linux systems to enable encryption in file systems, using DES, 3DES, and other encryption techniques?
Question 37
Multiple Choice
When following the ISO _____ format, a digital certificate includes a basic set of encrypted information.
Question 38
Multiple Choice
Which version of hashing algorithm uses a mathematical formula to reduce a message to 160 bits and then hashes a digital signature to go with the message?
Question 39
Multiple Choice
_____ authentication works by giving each frame or packet an identification or sequence number. This ensures the accuracy of ongoing communications and the authenticity of the communications source.