Answer the following statements true (T) or false (F)

1. The certificate message is required for any agreed on key exchange method except fixed Diffie-Hellman. ?
2. Phase 3 completes the setting up of a secure connection of the Handshake Protocol. ?
3. The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange. ?
4. SSL/TLS attacks can be grouped into four general categories: attacks on the handshake protocol, attacks on the record and application data protocols, attacks on the PKI, and other attacks.
5. Server authentication occurs at the transport layer, based on the server possessing a public/private key pair. ?


1. FALSE
2. FALSE
3. TRUE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

MC Which is a field that must contain unique data?

a) the marker field. b) the first field. c) the last field. d) None of the above.

Computer Science & Information Technology

All exception classes inherit, either directly or indirectly, from ________.

a. class Error. b. class RuntimeException. c. class Throwable. d. None of the above.

Computer Science & Information Technology

A proprietary feature supported by a Web browser is called a(n) ____.

A. integration B. intention C. amalgam D. extension

Computer Science & Information Technology

From January 2005 through July 2015, approximately how many electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers?

A. 456,000 B. 22 million C. 853 million D. 660 billion

Computer Science & Information Technology