Test Your Knowledge

     
1:

The Enigma machine used during the Second World War was an example of private key cryptography. True or False?

2:

Asymmetric key cryptography requires the use of a trusted third party to maintain our private keys. True or False?

3:

The Diffie-Hellman cryptographic system does not encrypt or sign any data passed between individual parties. True or False?

4:

An IPSec Security Association is a secure, bi-directional communication channel and its parameters such as encryption method, keys, and lifetime of keys. True or False?

5:

By default, IPFilter uses a concept known as least privilege. This effectively turns off all available network services requiring us to enable only the services we really need. True or False?



HP-UX CSE(c) Official Study Guide and Desk Reference
HP-UX CSE(c) Official Study Guide and Desk Reference
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net