CASP+:Chapter 9B

CASP+:Chapter 9B

University

23 Qs

quiz-placeholder

Similar activities

Data Structure

Data Structure

University

20 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

BSA - Elec - Finals

BSA - Elec - Finals

University

20 Qs

Day 12 - Networking & Security I - 1st Review - Day 11

Day 12 - Networking & Security I - 1st Review - Day 11

University

20 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

CASP+:Chapter 9B

CASP+:Chapter 9B

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption standard is commonly associated with securing email communication?

A) SSL/TLS

B) AES-GCM

C) RSA

D) S/MIME

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which EAP method establishes an encrypted tunnel with mutual authentication using public key certificates?

A) EAP-TLS

B) PEAP

C) EAP-TTLS

D) EAP-FAST

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm uses factoring large prime numbers as its basis?

A) RSA (Rivest, Shamir, and Adleman)

B) DSA (Digital Signature Algorithm)

C) ECDSA (Elliptic-Curve Digital Signature Algorithm)

D) Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role do Key Distribution Centers (KDCs) play in the process of cryptographic key exchange?

A) Distributing session keys to parties upon request

B) Establishing a shared secret key over an insecure channel without a prior shared secret

C) Encrypting and exchanging a secret key using public-key encryption

D) Managing digital certificates containing public keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the fundamental characteristic of asymmetric algorithms, also known as public-key algorithms?

A) They use the same key for encryption and decryption.

B) They require the sender and receiver to share a secret key.

C) They utilize pairs of keys: a public key and a private key.

D) They rely on symmetric encryption for secure communication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which version of TLS is considered the most secure and should be used?

A) 1.0

B) 1.1

C) 1.2

D) 1.3

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which EAP method uses a Protected Access Credential (PAC) instead of a certificate for tunnel setup, with challenges in secure PAC distribution?

A) EAP-TLS

B) PEAP

C) EAP-TTLS

D) EAP-FAST

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?