What size block does Skipjack use?
A. 64
B. 128
C. 512
D. 256
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?
A. TLS
B. 3DES
C. SSL
D. AES
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.
A. Twofish
B. DESX
C. IDEA
D. FISH
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
What advantage do symmetric algorithms have over asymmetric algorithms
A. They are faster
B. They are more secure
C. It is easier to implement them in software
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Which of the following is the standard for digital certificates?
A. 509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure protocol for browsing the web. They are also used in offline applications, like electronic signatures. An X.509 certificate contains a public key and an identity (a hostname, or an organization, or an individual), and is either signed by a certificate authority or self-signed. When a certificate is signed by a trusted certificate authority, or validated by other means, someone holding that certificate can rely on the public key it contains to establish secure communications with another party, or validate documents digitally signed by the corresponding private key.
B. X.509
C. RFC 2298
D. 509
https://en.wikipedia.org/wiki/X.509
E. CA
F. CRL
正解:B
質問 6:
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
A. 128 bi and TKIP
B. 64 bit and CCMP
C. 128 bit and CCMP
D. 128 bit and CRC
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
During the process of encryption and decryption, what keys are shared?
A. Private keys
B. Public and private keys
C. User passwords
D. Public keys
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
A. Payload
B. Channel
C. Carrier
D. Signal
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 9:
John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?
A. EAP
B. Radius
C. CHAP
D. Kerberos
正解:D
Okumura -
全力を尽くして勉強していただきます。212-81学習教材は有効です。簡単になります。いい資料です!