CAS004: Set 4

CAS004: Set 4

University

18 Qs

quiz-placeholder

Similar activities

Transport Layer Security

Transport Layer Security

University

20 Qs

PWEB XII RPL

PWEB XII RPL

University

15 Qs

Câu hỏi về phương pháp truy cập

Câu hỏi về phương pháp truy cập

University

20 Qs

Cybersecurity Compliance - week 4

Cybersecurity Compliance - week 4

University

14 Qs

004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

19 Qs

BATTLE(1KS4)-CHAPTER-13-Cybercrime & Information SysSec-Temu12

BATTLE(1KS4)-CHAPTER-13-Cybercrime & Information SysSec-Temu12

University

21 Qs

DATA AND NETWORK SECURITY

DATA AND NETWORK SECURITY

University

15 Qs

NETWORKING -SWITCHING 2

NETWORKING -SWITCHING 2

University

20 Qs

CAS004: Set 4

CAS004: Set 4

Assessment

Quiz

Computers

University

Medium

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most authentication systems make use of a one-way encryption process. Which of the following best offers an example of one-way encryption?

Asymmetric encryption

Symmetric encryption

Hashing

PKI

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A junior administrator comes to you in a panic after seeing the cost for certificates. She would like to know if there is a way to get one certificate to cover all domains and subdomains for the organization. What solution can you offer?

Wildcards

Blanket certificates

Distributed certificates

No solution exists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've discovered that an expired certificate is being used repeatedly to gain logon privileges. To what list should the certificate have been added?

Wildcard verification

Expired key revocation list

Online Certificate Status Protocol

Certificate revocation list (CRL)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way to prove the authenticity of an email. Which would you recommend?

Hashing

Digital signature

Symmetric encryption

Asymmetric encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A junior administrator at a sister company called to report a possible exposed private key that is used for PKI transactions. The administrator would like to know the easiest way to check whether the lost key has been flagged by the system. What are you going to tell the administrator?

Hashing

Issuance to entities

Online Certificate Status Protocol

Wildcard verification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an early form of encryption also known as ROT3?

Transposition cipher

Substitution cipher

Scytale

Caesar's cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an advantage of symmetric encryption?

It's powerful

A small key works well for bulk encryption

It offers confidentiality

Key exchange is easy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?