Page 181 - StudyBook.pdf
P. 181
Communication Security: Remote Access and Messaging • Chapter 3 165
11. Most ISPs offer their customers a service to block _____.
A. Hoaxes
B. SMTP relay
C. Viruses
D. Spam
12. S/MIME uses a/an ________________ for key exchange as well as digital
signatures.
A. Symmetric cipher
B. Asymmetric cipher
C. Public-key algorithm
D. Mimic algorithm
13. PGP can fall victim to a _________________ attack, which occurs when a
hacker creates a message and sends it to a targeted userid with the expectation
that this user will then send the message out to other users.When a targeted
user distributes a message to others in an encrypted form, a hacker can listen
to the transmitted messages and figure out the key from the newly created
ciphertext.
A. Birthday
B. Ciphertext
C. Sniffer
D. Brute-force
www.syngress.com