Page 181 - StudyBook.pdf
P. 181

Communication Security: Remote Access and Messaging • Chapter 3  165

                  11. Most ISPs offer their customers a service to block _____.

                      A. Hoaxes
                      B. SMTP relay
                      C. Viruses

                      D. Spam

                  12. S/MIME uses a/an ________________ for key exchange as well as digital
                      signatures.
                      A. Symmetric cipher
                      B. Asymmetric cipher

                      C. Public-key algorithm
                      D. Mimic algorithm

                  13. PGP can fall victim to a _________________ attack, which occurs when a
                      hacker creates a message and sends it to a targeted userid with the expectation
                      that this user will then send the message out to other users.When a targeted
                      user distributes a message to others in an encrypted form, a hacker can listen
                      to the transmitted messages and figure out the key from the newly created
                      ciphertext.

                      A. Birthday
                      B. Ciphertext
                      C. Sniffer

                      D. Brute-force
























                                                                              www.syngress.com
   176   177   178   179   180   181   182   183   184   185   186