The other three choices are incorrect. Key list is a printed series of key settings for a specific cryptonet. Key lists may be produced in list, pad, or printed tape format. Key loader is a self-contained unit that is capable of storing at least one plaintext or encrypted cryptographic key or key component that can be transferred, upon request, into a cryptographic module. Key exchange is the process of exchanging public keys and other information in order to establish secure communications.
3. Transaction privacy controls do
a. Secure sockets layer (SSL)
b. Mandatory access controls (MAC)
c. Transmission layer security (TLS)
d. Secure shell (SSH)
4. A cryptographic key has been compromised due to usage and age. The next step is to use which of the following?
a. DNSSEC-aware resolver
b. Key rollover
c. Zone signing key
d. Key signing key
The DNSSEC-aware resolver is incorrect because it is an entity that sends DNS queries, receives DNS responses, and understands the DNSSEC specification, even if it is incapable of performing validation. A zone-signing key is incorrect because it is an authentication key that corresponds to a private key used to sign a zone. A key signing key is incorrect because it is an authentication key that corresponds to a private key used to sign one or more other authentication keys for a given zone.
5. Which of the following protocols is used to encrypt individual messages?
a. Secure sockets layer (SSL)
b. Transport layer security (TLS)
c. Secure hypertext transfer protocol (S-HTTP)
d. Hypertext transfer protocol (HTTP)
6. For cryptography, which of the following refers to the worst-case measure of uncertainty for a random variable with the greatest lower bound?
a. Max-entropy
b. Min-entropy
c. Guessing entropy
d. Min-Max entropy
7. Countermeasures against brute force attacks on cryptographic keys include which of the following?
1. Change keys
2. Increase key length
3. Change protocol
4. Change algorithm
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1 and 3
8. For cryptography, what is nonce?
a. Timestamp plus sequence number
b. Checksum plus check digit
c. Payload plus protocol
d. Public key plus private key