IT Security: Defense against the digital dark arts questions and answers already passed
What information does a digital certificate contain? Check all that apply. Digital signature Public Key Data Identifying information of the certificate owner. A digital certificate contains the public key information, along with a digital signature from a CA. It also includes information about the certificate, like the entity that the certificate was issued to. Which type of encryption does SSL/TLS use? Both : Asymmetric and Symmetric Encryptions What are some of the functions that a Trusted Platform Module can perform? Check all that apply. Remote Attestation Data Binding and Sealing. A TPM can be used for remote attestation, ensuring that a host is a known good state and hasn't been modified or tampered (from a hardware and a software perspective). TPMs can also seal and bind data to them, encrypting data against the TPM. This also allows it to be decrypted by the TPM, only if the machine is in a good and trusted state. Plaintext is the original message, while _____ is the encrypted message. Ciphertext The specific function of converting plaintext into ciphertext is called a(n) ______. Encryption Algorithm
Written for
- Institution
- IT Security: Defense against the digital dark arts
- Course
- IT Security: Defense against the digital dark arts
Document information
- Uploaded on
- May 7, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts