What is PKCS?
A) A method of private cryptography used by the military
B) A method of encrypting e-mail from the IRS
C) One of the standards used in implementing a public key infrastructure
D) The method of encryption that used a 40 bit encryption keyC
PKI stands for _______________
For products evaluated by Common Criteria, the highest level of assurance is
A) EAL 7
B) EAL 1
D) EAL 8
WEP uses public key encryption so it has secure wireless communications.
A mantrap is used to prevent piggybacking.
Theft of the computer, using a boot disk to simply erase all data on the drives, or simply
unplugging computers are all effective for ___________.
A false positive is when a biometric is scanned and allows access—when it was not the
person who has authorization.
What is PKIX?
A) The method of encryption that uses a 40 bit encryption key
B) One of the standards used in implementing a public key infrastructure
C) A method of encrypting e-mail from the IRS
D) A method of private cryptography used by the military
_______________ is the process is taking the entire contents of a hard drive and copying
them to a single file on a different media.
Correct Answer(s): Drive imaging
The X.905 standard specifies formats for public key certificates.
An ionization fire detection device
A) Detects smoke
B) Provides advanced warning for smoldering fires
C) Detects fast burning fires
D) Detects heat
_______________ is used to encrypt web traffic and uses port 443.
Pretty good privacy (or PGP) is
A) A privacy group that fights against the government
B) A password management system
C) A common encryption method for e-mail
D) A method of security an operating system kernel
_______________ is a message specification extension to the MIME standard, used to
provide a way to send and receive signed and encrypted MIME data.
Correct Answer(s): S/MIME
A popular program us