Answer the following statements true (T) or false (F)
1. Some sort of mechanism or protocol is needed to provide for the secure distribution of keys.
2. A public-key certificate scheme alone does not provide the necessary security to authenticate the public key.
3. For symmetric encryption to work the two parties to an exchange must share the same key and that key must be protected from access by others.
4. X.509 defines the format for private-key certificates.
5. The topics of cryptographic key management and cryptographic key distribution are complex, involving cryptographic, protocol, and management considerations.
1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
You might also like to view...
A system recovery drive boots your computer from an external hard drive or USB flash drive, and helps you reinstall Windows along with the device drivers and utilities needed to get your computer up and running.
Answer the following statement true (T) or false (F)
Match the following options with the tab where it can be accessed:
I. add a picture to a slide A. Picture Tools Format tab II. remove a background from an image B. Design tab III. create a background from a picture C. Video Tools Playback tab IV. crop a video D. Video Tools Format tab V. fade video in and out E. Insert tab
A _____ is a security weakness or soft spot.
A. proxy B. vulnerability C. firewall D. malware
What are the advantages to sharing networked hardware? What are the advantages to sharing networked software? What are some disadvantages to connecting a computer to a network? Is it safe to be connected to a network?
What will be an ideal response?