8.7.4 Check Your Understanding – Recommend Encryption

1. True or false. Instant messaging can be encrypted using PKI.

  • True
  • False

Explanation: Instant messaging can be encrypted using PKI.

2. True or false. PKI can be used by the enterprise to secure USB storage devices.

  • true
  • false

Explanation: USB storage devices can be encrypted using PKI.

3. What must be specified by the X509v3 validity date range? (choose two)

  • after
  • before
  • not after
  • not before

Explanation: The X.509v3 certificates specify “not before” and “not after” dates. If the current date is outside the range, the web browser displays a message.

4. Which of the following is not a key component of the cipher suite?

  • message authentication code (MAC)
  • authentication algorithm
  • encryption algorithm
  • the key exchange algorithm
  • authorization algorithm

Explanation: The key components of the cipher suite are the Message Authentication Code Algorithm (MAC), the encryption algorithm, the key exchange algorithm, and the authentication algorithm. These can be changed without replacing the entire protocol.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments