問題一覧
1
Certificate retrieval
2
Certificate validation
3
Start and end date
4
Issuing CA was compromised
5
Revoked and hold
6
The certificate may be revalidated after investigation
7
24 hours
8
By verifying its signature using the CA’s public key
9
OCSP
10
FTP
11
Use of export-grade cipher suites
12
40-bit
13
TUNNEL
14
Symmetric encryption and hashing
15
Connect a host to a trusted network over a public network
16
ESP and AH
17
Key exchange and tunnel policy definition
18
UDP 500
19
50 and 51
20
End-to-end encryption across the network
21
Tunnel traffic is visible at both ends
22
Volunteer computers
23
It uses global volunteer nodes with multiple hopsIt
24
To keep a copy of the encryption key for government access
25
Nobody But Us
26
Sending data to be encrypted and then analyzing it
27
Combining parts of messages to create a new malicious message
28
Time used in key generation
29
Calculating time taken to decrypt a message
30
Vulnerability to FREAKBrute force attacks
31
Susceptible to numerous known attacks
32
Storing a copy of encryption keys for government use
33
Storing a copy of encryption keys for government use
34
Nobody But Us
35
Exhaustive search
36
Both ciphertext and part of the corresponding plaintext
37
Man-in-the-middle
38
Send a message to be encrypted, then analyze the ciphertext
39
Active attack
40
By measuring how long it takes to decrypt a message
41
Lack of key rotation
42
RSA
問題一覧
1
Certificate retrieval
2
Certificate validation
3
Start and end date
4
Issuing CA was compromised
5
Revoked and hold
6
The certificate may be revalidated after investigation
7
24 hours
8
By verifying its signature using the CA’s public key
9
OCSP
10
FTP
11
Use of export-grade cipher suites
12
40-bit
13
TUNNEL
14
Symmetric encryption and hashing
15
Connect a host to a trusted network over a public network
16
ESP and AH
17
Key exchange and tunnel policy definition
18
UDP 500
19
50 and 51
20
End-to-end encryption across the network
21
Tunnel traffic is visible at both ends
22
Volunteer computers
23
It uses global volunteer nodes with multiple hopsIt
24
To keep a copy of the encryption key for government access
25
Nobody But Us
26
Sending data to be encrypted and then analyzing it
27
Combining parts of messages to create a new malicious message
28
Time used in key generation
29
Calculating time taken to decrypt a message
30
Vulnerability to FREAKBrute force attacks
31
Susceptible to numerous known attacks
32
Storing a copy of encryption keys for government use
33
Storing a copy of encryption keys for government use
34
Nobody But Us
35
Exhaustive search
36
Both ciphertext and part of the corresponding plaintext
37
Man-in-the-middle
38
Send a message to be encrypted, then analyze the ciphertext
39
Active attack
40
By measuring how long it takes to decrypt a message
41
Lack of key rotation
42
RSA