Answer the following statements true (T) or false (F)

1. The certificate message is required for any agreed on key exchange method except fixed Diffie-Hellman. ?
2. Phase 3 completes the setting up of a secure connection of the Handshake Protocol. ?
3. The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange. ?
4. SSL/TLS attacks can be grouped into four general categories: attacks on the handshake protocol, attacks on the record and application data protocols, attacks on the PKI, and other attacks.
5. Server authentication occurs at the transport layer, based on the server possessing a public/private key pair. ?

1. FALSE
2. FALSE
3. TRUE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

When you double-click a Word template file, the file will open as a new:

A) template. B) document. C) form. D) content control.

Computer Science & Information Technology

Describe three of the six steps you can take to avoid spam as presented in this chapter.

What will be an ideal response?

Computer Science & Information Technology