Which three protocols use asymmetric key algorithms? (Choose three.)

Chapter 4

Quiz
•
Other
•
Professional Development
•
Hard
sam foon
FREE Resource
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Secure Shell (SSH)
Pretty Good Privacy (PGP)
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Answer explanation
Refer to Chapter 4 - Slides 9 - Symmetrical versus Asymmetrical Encryption
Four protocols use asymmetric key algorithms:
1) Internet Key Exchange (IKE), which is a fundamental component of IPsec Virtual Private Networks (VPNs).
2) Secure Socket Layer (SSL), which is a means of implementing cryptography into a web browser.
3) Secure Shell (SSH), which is a protocol that provides a secure remote access connection to network devices.
4) Pretty Good Privacy (PGP), which is a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
steganography
cryptography
data masking
Answer explanation
Refer to Chapter 4 - Slides 24 - Steganography
Steganography conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage of steganography over cryptography is that the secret message does not attract any special attention. No one would ever know that a picture actually contained a secret message by viewing the file either electronically or in hardcopy.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
WEP
DES
RSA
Diffie-Hellman (DH)
Answer explanation
Refer to Chapter 4 - Slides 7 - Public-Key Encryption
Diffie-Hellman - provides an electronic exchange method to share the secret key. Secure protocols, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Secure Shell (SSH), and Internet Protocol Security (IPsec), use Diffie-Hellman.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
symmetric
asymmetric
transposition
one-time pad
Answer explanation
Refer to Chapter 4 - Slides 5 - Overview
Asymmetric algorithms - Asymmetrical encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, and the receiver is the only one that can decrypt it using his private key. Parties exchange secure messages without needing a pre-shared key. Asymmetric algorithms are more complex. These algorithms are resource intensive and slower to execute.
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which three devices represent examples of physical access controls? (Choose three.)
locks
firewalls
swipe cards
video cameras
Answer explanation
Refer to Chapter 4 - Slides 13 - Types of Access Control
Examples of physical access controls include the following:
- Guards monitor the facility
- Fences protect the perimeter
- Motion detectors detect moving objects
- Laptop locks safeguard portable equipment
- Locked doors prevent unauthorized access
- Swipe cards allow access to restricted areas
- Guard dogs protect the facility
- Video cameras monitor a facility by collecting and recording images
- Mantraps allow access to the secured area after door 1 closes
- Alarms detect intrusion
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
hash
symmetric
asymmetric
one-time pad
Answer explanation
Refer to Chapter 4 - Slides 5 - Overview
Symmetric algorithms - These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
detective
deterrent
masking
preventive
Answer explanation
Refer to Chapter 4 - Slides 19 - Types of Security Controls
Deterrent Controls - A deterrent is the opposite of a reward. A reward encourages individuals to do the right thing, while a deterrent discourages them from doing the wrong thing. Cybersecurity professionals and organizations use deterrents to limit or mitigate an action or behavior. Deterrents do not always stop these actions.
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
AWS Architect Test 2

Quiz
•
Professional Development
15 questions
Cybersecurity Awareness Quiz

Quiz
•
Professional Development
15 questions
SKO 2025 QUIZ

Quiz
•
Professional Development
10 questions
Topics 5 Motion & Title Graphic

Quiz
•
Professional Development
5 questions
Cyber Security Awareness Month

Quiz
•
Professional Development
11 questions
Quiz PUK

Quiz
•
Professional Development
13 questions
Blockchain Bootcamp Quiz 01

Quiz
•
Professional Development
10 questions
Tour de Campus Quiz

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade