
Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Quiz
•
Computers
•
Professional Development
•
Easy
Trey Conn
Used 3+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
GCGA, a software development company, occasionally updates its software with major updates and minor patches. Administrators load these updates to the company website along with a hash associated with each update. Which of the following BEST describes the purpose of the hash?
Availability of updates and patches
Integrity of updates and patches
Confidentiality of updates and patches
Integrity of the application
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Users in your organization sign their emails with digital signatures. Which of the following provides integrity for these digital signatures?
Hashing
Encryption
Non-repudiation
Private key
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
While reviewing logs on a web server hosted by your organization, you notice multiple logon failures to an FTP account, but they're only happening about once every 30 minutes. You also see that the same password is being tried against the SSH account right after the FTP account logon failure. What BEST describes what is happening?
Brute force attack
Dictionary attack
Plaintext attack
Spraying attack
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
An online application requires users to log on with their email address and a password. The application encrypts the passwords in a hashed format. Which of the following can be added to decrease the likelihood that attackers can discover these passwords?
Rainbow tables
Salt
Digital signatures
Input Validation
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the primary difference between a block cipher and a stream cipher?
A stream cipher encrypts data 1 bit or 1 byte at a time
A block cipher encrypts data 1 bit or 1 byte at a time
Stream ciphers are used for symmetric encryption, but block ciphers are used for asymmetric encryption
Block ciphers are used for symmetric encryption, but stream ciphers are used for asymmetric encryption
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A developer is creating an application that will encrypt and decrypt data on mobile devices. These devices don't have a lot of processing power. Which of the following cryptographic methods has the LEAST overhead and can provide encryption for these mobile devices?
Elliptic curve cryptography
Perfect forward secrecy
Salting
Digital signatures
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
You are configuring a web server that will be used by salespeople via the Internet. Data transferred to and from the server needs to be encrypted, so you are tasked with requesting a certificate for the server. Which of the following would you MOST likely use to request the certificate?
CA
CRL
CSR
OCSP
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
Part 1.3

Quiz
•
Professional Development
25 questions
COCAT - DAA

Quiz
•
University - Professi...
25 questions
Front End Forge Final

Quiz
•
Professional Development
26 questions
Digital Marketer Revision Quiz 2

Quiz
•
Professional Development
25 questions
ProComm Unit 5 Review

Quiz
•
Professional Development
30 questions
Excel

Quiz
•
University - Professi...
25 questions
Network+ Domain 1

Quiz
•
Professional Development
25 questions
Institute of Marine Technology,Bagerhat Portative Assessment

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade