Search Header Logo

PKI, DMZ & Proxy

Authored by M Salman Nadeem

Information Technology (IT)

University

Used 3+ times

PKI, DMZ & Proxy
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is Not classified as a Man in the Middle (MiTM) or Adversary-in-the-Middle (AiTM) attack?

Sender/Source spoofing

SQL injection

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes Public Key Infrastructure (PKI)?

A framework for enforcing single sign-on in enterprise networks

A system of hardware, software, policies, and standards for managing digital certificates and public-key encryption

A protocol designed to handle secure file transfers over the Internet

A set of regulations requiring organizations to encrypt all email traffic

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

X.509 certificates typically contain which of the following pieces of information?

The user’s password

A private symmetric key

The certificate owner’s public key

The OCSP revocation list

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Certificate Authority (CA) hierarchies, the highest level of trust is usually assigned to:

Subordinate CAs

Intermediate CAs

Root CAs

Registration Authorities

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

OCSP (Online Certificate Status Protocol) is primarily used to:

Issue new certificates on demand

Revoke expired keys in real time

Determine the revocation status of digital certificates

Encrypt data transmitted between a client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DNS CAA (Certification Authority Authorization) records allow a domain owner to:

Block Domain Name System lookups

Authorize specific CAs to issue certificates for their domain

Prevent domain hijacking through DNSSEC

Configure custom SSL/TLS cipher suites

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Non-web PKI implementations, such as S/MIME, are commonly used to:

Secure email communications with digital signatures and encryption

Replace all TLS connections in web browsers

Validate the authenticity of DNS records

Implement a web-of-trust for VoIP calls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?