CH 17
CH 17
Stallings
TRUE OR FALSE
T F 10. The first element of the CipherSuite parameter is the key exchange
method.
MULTIPLE CHOICE
A) SSH B) HTTP
C) SLP D) TLS
A) Active B) Passive
C) Shell D) Psuedo
4. The symmetric encryption key for data encrypted by the client and decrypted by
the server is a _________ .
5. _________ provides secure, remote logon and other secure client/server facilities.
A) SLP B) HTTPS
C) TLS D) SSH
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
6. An SSL session is an association between a client and a server and is created by
the ___________ .
9. With each element of the list defining both a key exchange algorithm and a
CipherSpec, the list that contains the combination of cryptographic algorithms
supported by the client in decreasing order of preference is the __________ .
A) CipherSuite B) Random
C) Session ID D) Version
A) 4 B) 1
C) 2 D) 3
A) server_done B) no_certificate
C) goodbye D) finished
A) SSH B) CCSP
C) TLS D) SHA-1
15. _________ is organized as three protocols that typically run on top of TCP for
secure network communications and are designed to be relatively simple and
inexpensive to implement.
A) SSL B) SSH
C) TLS D) SSI
SHORT ANSWER
2. The _________ Protocol allows the server and client to authenticate each other
and to negotiate an encryption and MAC algorithm along with cryptographic
keys to be used to protect data sent in an SSL Record.
7. Two important SSL concepts are the SSL session and the SSL _________ .
10. _________ would appear to be the most secure of the three Diffie-Hellman
options because it results in a temporary, authenticated key.
11. A signature is created by taking the hash of a message and encrypting it with
the sender's _________ .
12. The handshake is complete and the client and server may begin to exchange
application layer data after the server sends its finished message in phase
_________ of the Handshake Protocol.
13. _________ require a client write MAC secret, a server write MAC secret, a client
write key, a server write key, a client write IV, and a server write IV, which
are generated from the master secret in that order.
15. __________ allows the client to set up a "hijacker" process that will intercept
selected application-level traffic and redirect it from an unsecured TCP
connection to a secure SSH tunnel.