Day 2 Quiz - Cryptographic Solutions & Identity Management
Quiz
•
Professional Development
•
Professional Development
•
Practice Problem
•
Medium
Standards-aligned
Robert Teney
Used 2+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which of the following cryptographic solutions is best suited for securing communication between two parties over an untrusted network?
Full-disk encryption
Asymmetric encryption
Secure Enclave
Key escrow
Answer explanation
Asymmetric encryption uses a pair of keys (a public key and a private key) to encrypt and decrypt data. It is well-suited for securing communications over an untrusted network, as it allows secure key exchange and the establishment of encrypted communication channels.
Tags
Objective 1.4
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which cryptographic tool would you use to securely store and manage encryption keys for a large enterprise environment?
Trusted Platform Module (TPM)
Hardware Security Module (HSM)
Steganography
Public key
Answer explanation
Hardware Security Module (HSM) is a physical device that provides secure key management and cryptographic operations. It is designed to securely generate, store, and manage encryption keys, making it ideal for enterprise environments.
Tags
Objective 1.4
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which of the following cryptographic concepts adds unique data to a password before hashing it to prevent rainbow table attacks?
Blockchain
Digital Signatures
Salting
Key Stretching
Answer explanation
Salting is the process of adding unique, random data (known as a salt) to a password before it is hashed. This technique ensures that even if two users have the same password, their hashes will be different, thus preventing rainbow table attacks. Key Stretching strengthens weak passwords by applying multiple iterations of hashing but does not add unique data to the password.
Tags
Objective 1.4
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which certificate component is used to provide real-time status information on the validity of a digital certificate?
Certificate Revocation List (CRL)
Online Certificate Status Protocol (OCSP)
Certificate Signing Request (CSR)
Wildcard Certificate
Answer explanation
Online Certificate Status Protocol (OCSP) is a protocol used to check the real-time status of a digital certificate. It allows clients to query a CA for the validity of a certificate without having to download and parse a full CRL.
Tags
Objective 1.4
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Objective 4.5/Day 2 -
Your organization has noticed an increase in unauthorized access attempts to sensitive subnets within the internal network. As a security administrator, you need to enhance the network's security posture by modifying firewall settings. Which of the following actions would be the most appropriate to improve security?
Implement DNS filtering to block access to malicious domains.
Configure firewall rules to block all inbound traffic on non-essential ports.
Deploy agent-based web filters on all user devices.
Enable IDS/IPS to monitor trends in network traffic and update signatures regularly.
Answer explanation
Firewall rules are critical for controlling access to the network. By blocking inbound traffic on non-essential ports, you can reduce the attack surface and prevent unauthorized access to sensitive subnets.
Tags
Objective 4.5
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.5/Day 2 -
Your organization is experiencing frequent phishing attacks, and employees are accessing websites with poor reputations. As a security administrator, you need to implement a solution that can block access to these websites and protect the organization. Which of the following solutions would be most effective in this scenario?
Configure Group Policy to enforce strict password policies.
Deploy a centralized proxy server to perform URL scanning and content categorization.
Implement SELinux to enforce security policies at the operating system level.
Modify the firewall to block all outbound traffic.
Answer explanation
Centralized proxy servers are effective for controlling and monitoring web traffic. By performing URL scanning and content categorization, you can block access to websites with poor reputations and prevent phishing attacks.
Tags
Objective 4.5
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Objective 4.5/Day 2 -
Your organization has recently implemented a new email security protocol, but employees are still receiving phishing emails that appear to be from trusted internal sources. To mitigate this risk, you need to ensure that only authorized mail servers are allowed to send emails on behalf of your domain. Which of the following actions should you take?
Implement Domain-based Message Authentication Reporting and Conformance (DMARC).
Configure DomainKeys Identified Mail (DKIM) to add a digital signature to outgoing emails.
Set up Sender Policy Framework (SPF) to define authorized mail servers.
Deploy a secure email gateway to filter incoming and outgoing emails.
Answer explanation
SPF is specifically designed to identify which mail servers are permitted to send emails on behalf of your domain, helping to prevent spoofing and phishing attempts.
Tags
Objective 4.5
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Business and Professional Excellence
Quiz
•
Professional Development
20 questions
Hampshire UK: Do you know it?
Quiz
•
8th Grade - Professio...
20 questions
DesApp iOs
Quiz
•
Professional Development
20 questions
Pneumatics comprehension
Quiz
•
Professional Development
18 questions
Customer Relations Day 6
Quiz
•
Professional Development
20 questions
Try Out Sertifikasi Bendahara Pengeluaran (Bagian I)
Quiz
•
Professional Development
20 questions
Tenses - Past Tense form
Quiz
•
8th Grade - Professio...
20 questions
Assertiveness
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
