a sensitive connection between a client and a web server uses what class of certificate?

a sensitive connection between a client and a web server uses what class of certificate?

Asked by 2 years ago
9.9k points
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:Server digital
Digital certificates cannot be used to identify objects other than users.False
Select below the secure alternative to the telnet protocol:SSH
SSL and TLS keys of what length are generally considered to be strong?4096
Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature.True
Why is IPsec considered to be a transparent security protocol?IPsec is designed to not require modifications of programs, or additional training, or additional client setup
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?Registration Authority
What cryptographic transport algorithm is considered to be significantly more secure than SSL?TLS
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.True
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?IPSec
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?SSL
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.True
A framework for all of the entities involved in digital certificates for digital certificate management is known as:Public key infrastructure
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.False
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?bridge trust
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:Certification Authority
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?distributed trust
At what stage can a certificate no longer be used for any type of authentication?expiration
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?third-party
A sensitive connection between a client and a web server uses what class of certificate?Class 2
Using what mechanism below can the non-repudiation of an e-mail and it's content be enforced?Asymmetric encryption
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?Certificate practice statement (CPS)
The process by which keys are managed by a third party, such as a trusted CA, is known as?Key escrow
What kind of certificate is typically used by an individual to secure e-mail transmissions?Personal digital
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?Hashing
a sensitive

Your Answer

Surround your text in *italics* or **bold**, to write a math equation use, for example, $x^2+2x+1=0$ or $$\beta^2-1=0$$

Use LaTeX to type formulas and markdown to format text. See example.

Sign up or Log in

  • Answer the question above my logging into the following networks
Sign in
Sign in
Sign in

Post as a guest

  • Your email will not be shared or posted anywhere on our site

Views: 41
Asked: 2 years ago