Date in a Note Protect Against
Select the best possible answer by underlining the selected answer.
What type of attack does including a date in a note protect against?
A) Replay
B) Reflection
C) Spoofing/Masquerade
D) Modification
E) Eavesdropping
F) Fabrication
What type of attack does including a digital signature with a note protect against?
A) Replay
B) Reflection
C) Spoofing/Masquerade
D) Denial of Service
E) Eavesdropping
F) Enumeration
What type of attack does encrypting a note protect against?
A) Replay
B) Reflection
C) Spoofing/Masquerade
D) Modification
E) Eavesdropping
F) Fabrication
Which of the following methods should not be used to transmit your public key certificate?
A) Email using enterprise (corporate) email system
B) Email using free email (Gmail, Yahoo Mail, Hotmail, etc.)
C) Post anonymously to a public Internet message board
D) Share via portable USB storage drive
E) Corporate collaboration site (SharePoint, etc.)
F) All of the above methods are acceptable
Which of the following methods should not be used to transmit the fingerprint for your public key certificate?
A) Email using enterprise (corporate) email system
B) Spoken via telephone to the intended party
C) Post anonymously to the same public Internet message board used to share your key
D) Printed on the key owner’s business card
E) None of the above methods are acceptable
Resources
- 24 x 7 Availability.
- Trained and Certified Experts.
- Deadline Guaranteed.
- Plagiarism Free.
- Privacy Guaranteed.
- Free download.
- Online help for all project.
- Homework Help Services