The other three choices are incorrect. Key list is a printed series of key settings for a specific cryptonet. Key lists may be produced in list, pad, or printed tape format. Key loader is a self-contained unit that is capable of storing at least one plaintext or encrypted cryptographic key or key component that can be transferred, upon request, into a cryptographic module. Key exchange is the process of exchanging public keys and other information in order to establish secure communications.
3. Transaction privacy controls do
a.
Secure sockets layer (SSL)b.
Mandatory access controls (MAC)c.
Transmission layer security (TLS)d.
Secure shell (SSH)4. A cryptographic key has been compromised due to usage and age. The next step is to use which of the following?
a.
DNSSEC-aware resolverb.
Key rolloverc.
Zone signing keyd.
Key signing keyThe DNSSEC-aware resolver is incorrect because it is an entity that sends DNS queries, receives DNS responses, and understands the DNSSEC specification, even if it is incapable of performing validation. A zone-signing key is incorrect because it is an authentication key that corresponds to a private key used to sign a zone. A key signing key is incorrect because it is an authentication key that corresponds to a private key used to sign one or more other authentication keys for a given zone.
5. Which of the following protocols is used to encrypt individual messages?
a.
Secure sockets layer (SSL)b.
Transport layer security (TLS)c.
Secure hypertext transfer protocol (S-HTTP)d.
Hypertext transfer protocol (HTTP)6. For cryptography, which of the following refers to the worst-case measure of uncertainty for a random variable with the greatest lower bound?
a.
Max-entropyb.
Min-entropyc.
Guessing entropyd.
Min-Max entropy7. Countermeasures against brute force attacks on cryptographic keys include which of the following?
1.
Change keys2.
Increase key length3.
Change protocol4.
Change algorithma.
1 and 2b.
2 and 3c.
3 and 4d.
1 and 38. For cryptography, what is nonce?
a.
Timestamp plus sequence numberb.
Checksum plus check digitc.
Payload plus protocold.
Public key plus private key