100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN260 TEST QUESTIONS AND CORRECT ANSWERS NEW UPDATE $11.49   Add to cart

Exam (elaborations)

ITN260 TEST QUESTIONS AND CORRECT ANSWERS NEW UPDATE

 0 view  0 purchase
  • Course
  • ITN260
  • Institution
  • ITN260

ITN260 TEST QUESTIONS AND CORRECT ANSWERS NEW UPDATE What symmetric algorithm was approved by NIST in late 2000, becoming a permanent replacement for DES? - Answer- AES What type of cryptography uses two keys instead of one? - Answer- asymmetric What type of cryptography uses a single sha...

[Show more]

Preview 1 out of 4  pages

  • October 10, 2024
  • 4
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN260
  • ITN260
avatar-seller
Scholarsstudyguide
ITN260 TEST QUESTIONS
AND CORRECT ANSWERS
NEW UPDATE
What symmetric algorithm was approved by NIST in late 2000, becoming a permanent
replacement for DES? - Answer- AES

What type of cryptography uses two keys instead of one? - Answer- asymmetric

What type of cryptography uses a single shared key? - Answer- asymmetric

What does Windows use to encrypt files? - Answer- EFS

Which of the following is responsible for issuing digital certificates? - Answer-
Certification Authority

Which of the following is responsible for identity-proofing the Subscriber of the digital
certificate? - Answer- Registration Authority

A document that describes, in detail, how the CA will issue and manage digital
certificates, as well as how the user (Subscriber) will apply for one is called a/an -
Answer- Certificate Practices Statement (CPS)

Which of the following protocols supports two encryption modes: Transport mode and
tunnel mode? - Answer- IPSec

A common encryption technology used with email and files. - Answer- PGP

In a ____ attack, attackers can attackers use hundreds or thousands of computers in an
attack against a single computer or network. - Answer- distributed

In a "____ attack," an ICMP packet is sent to all computers on the network, which
makes it appear that a server is asking for a response. - Answer- smurf

An IDS that detects and issues an alert when a mail server is receives a Telnet packet,
when most of the time it receives only SMTP requests, is an example of ____________
monitoring - Answer- Anomaly-based

An Administrator sees a hacker Telneting to Port 25. Which application is he trying to
get information about? - Answer- Email

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart