Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to Operating Systems Security
Quiz 3: Security Through Authentication and Encryption
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
If getting users to log off when they go home at night is a problem, which option should you modify in the figure above?
Question 42
Multiple Choice
Which option in the figure above turns Kerberos encryption on and off?
Question 43
True/False
Is MD4 incorporated into Microsoft's MS-CHAP v2 hashing algorithm?
Question 44
Multiple Choice
What form of encryption is being enabled in the figure above?
Question 45
Multiple Choice
Which authentication method is a physical device that enables the generation of a unique password each time a user logs on to a server or network?
Question 46
Multiple Choice
Which authentication method is used in Internet and network communications, and employs a handshaking protocol for authentication plus RSA for encryption?
Question 47
True/False
Is the maximum size of the private key in AES 256 bits in length?
Question 48
Multiple Choice
_____ is a set of IP-based secure communications and encryption standards created by the IETF, and was developed to provide secure network communications.
Question 49
Multiple Choice
Which authentication method is used on networks and in remote communications, typically employing Remote Authentication Dial-in User Servers and is compatible with many encryption methods?
Question 50
True/False
Are user passwords in Red Hat Linux encrypted using 3DES and stored in the /etc/passwd file?
Question 51
Multiple Choice
What does SSH use to authenticate a communications session that uses passwords?
Question 52
Multiple Choice
What size of keys can be used with SSL authentication?
Question 53
Multiple Choice
With which version(s) of IP is IPSec compatible?
Question 54
Multiple Choice
Why is SSH particularly suited to UNIX/Linux systems?
Question 55
Multiple Choice
At what TCP/IP layer does IPSec secure communications?
Question 56
Multiple Choice
What authentication method was designed using SSL as a model and is supported by the IETF as an Internet standard for secure communications?
Question 57
Multiple Choice
Which authentication method authenticates by using tickets to verify client and server communications, and employs private-key encryption?
Question 58
Multiple Choice
Which authentication method employs a unique set of digital information or a digital signature with a communication or a file as a means to verify the source and uses public-key asymmetrical encryption?