The Enigma machine used during the Second World War was an example of private key cryptography. True or False?
2:
Asymmetric key cryptography requires the use of a trusted third party to maintain our private keys. True or False?
3:
The Diffie-Hellman cryptographic system does not encrypt or sign any data passed between individual parties. True or False?
4:
An IPSec Security Association is a secure, bi-directional communication channel and its parameters such as encryption method, keys, and lifetime of keys. True or False?
5:
By default, IPFilter uses a concept known as least privilege. This effectively turns off all available network services requiring us to enable only the services we really need. True or False?