1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Recipients without S/MIME capability can view the message content, although they cannot verify the signature.
True
As an alternative the RSA public-key encryption algorithm can be used with either the SHA-1 or the MD5 message digest algorithm for forming signatures.
True
SMTP is used between the message user agent and the mail submission agent.
True
The ________ accepts the message submitted by a message user agent and enforces the policies of the hosting domain and the requirements of Internet standards.
A. mail submission agent
A. mail submission agent
B. message user agent
C. mail delivery agent
D. message transfer agent
The most complex part of SSL is the __________.
D. handshake protocol
A. TLS
B. message header
C. payload
D. handshake protocol
IPsec can assure that _________.
D. all of the above
A. a router advertisement comes from an authorized router
B. a routing update is not forged
C. a redirect message comes from the router to which the initial packet was sent
D. all of the above
The _______ field in the outer IP header indicates whether the association is an AH or ESP security association.
A. protocol identifier
A. protocol identifier
B. security parameter index
C. IP destination address
D. sequence path counter