A Admin π Coach β 38.23K Points π Information Cyber Security Q. What is the key size allowed in PGP? (A) 1024-1056 (B) 1024-4056 (C) 1024-4096 (D) 1024-2048 ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) 1024-4096
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. PGP makes use of which cryptographic algorithm? (A) des (B) aes (C) rsa (D) rabin ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) rsa
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. ISAKMP stands for ______ (A) internet system association and key management packet (B) internet security association and key management protocol (C) interchange system and key modeling protocol (D) internet security association and key modeling protocol ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) internet security association and key management protocol
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. ______ was invented by Phil Zimmerman. (A) ipsec (B) ssl (C) pgp (D) none of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) pgp
R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. In _______, the cryptographic algorithms and secrets are sent with the message. (A) ipsec (B) ssl (C) tls (D) pgp ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) pgp
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. ______ provides authentication at the IP level. (A) ah (B) esp (C) pgp (D) ssl ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) ah
A Admin π Coach β 38.23K Points π Information Cyber Security Q. In _____, there can be multiple paths from fully or partially trusted authorities. (A) x509 (B) pgp (C) kdc (D) none of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) pgp
V Vinay π Mover β 28.75K Points π Information Cyber Security Q. ________ provides privacy, integrity, and authentication in e-mail. (A) ipsec (B) ssl (C) pgp (D) none of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) pgp
R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. _______ uses the idea of certificate trust levels. (A) x509 (B) pgp (C) kdc (D) none of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) pgp
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. In ______, there is a single path from the fully trusted authority to any certificate. (A) x509 (B) pgp (C) kdc (D) none of the above ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) x509