Chapter 22 - Internet Security Protocols and Standards

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Recipients without S/MIME capability can view the message content, although they cannot verify the signature.

True

2
New cards

As an alternative the RSA public-key encryption algorithm can be used with either the SHA-1 or the MD5 message digest algorithm for forming signatures.

True

3
New cards

SMTP is used between the message user agent and the mail submission agent.

True

4
New cards

The ________ accepts the message submitted by a message user agent and enforces the policies of the hosting domain and the requirements of Internet standards.

A. mail submission agent

A. mail submission agent

B. message user agent

C. mail delivery agent

D. message transfer agent

5
New cards

The most complex part of SSL is the __________.

D. handshake protocol

A. TLS

B. message header

C. payload

D. handshake protocol

6
New cards

IPsec can assure that _________.

D. all of the above

A. a router advertisement comes from an authorized router

B. a routing update is not forged

C. a redirect message comes from the router to which the initial packet was sent

D. all of the above

7
New cards

The _______ field in the outer IP header indicates whether the association is an AH or ESP security association.

A. protocol identifier

A. protocol identifier

B. security parameter index

C. IP destination address

D. sequence path counter