ISM SSP

ISM SSP

University

17 Qs

quiz-placeholder

Similar activities

Network Protocols Quiz

Network Protocols Quiz

University

14 Qs

EXP-9(VIVA_VOCE)

EXP-9(VIVA_VOCE)

University

17 Qs

Cybersecurity Essentials

Cybersecurity Essentials

University

20 Qs

INFORMATIKA DAY 1

INFORMATIKA DAY 1

12th Grade - University

16 Qs

2.2 Data Transmission

2.2 Data Transmission

University

18 Qs

4.1 Kod Arahan

4.1 Kod Arahan

1st Grade - University

16 Qs

 BAB 4 | 4.1 KOD ARAHAN | SUBTOPIK 4.1.2

BAB 4 | 4.1 KOD ARAHAN | SUBTOPIK 4.1.2

2nd Grade - University

15 Qs

ISM SSP

ISM SSP

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Alin Alecu

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

1) The Record Protocol within SSL provides:

a. message confidentiality

b. authentication of entities

c. transaction's non-repudiation

d. message integrity

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

2) Which one of the following protocols can be used for creating VPN tunnels?

a. SSL

b. OCSP

c. IPSec

d. PPTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3) Which of the following affirmations about the SSL protocol are true?

a. it requires changing the TCP IP stack

b. it can only he used for securing the web traffic

c. is a third level protocol

d. it uses digital certificates for parties authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

4) Which of the main advantages of virtual private networks (VPN) in comparison with frame relay based networks, leased lines or dial-up?

a. increasing security level

b. lower installation and operation costs

c. higher transfer rates

d. higher availability for network services

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

5) What are the main advantages of the web of trust model used by PGP to establish trust in a public key:

a. transitivity of trust relationships

b. avoids the necessity of key revocation if the key was compromised

c. high scalability

d. doesn't need a third trustful entity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6) Which of the following protocols can he used for the centralized management of users’ credentials?

a. RADIUS

b. ARP

c. ICMP

d. TACACS+

e. LDAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7) S/MIME provides protection against:

a. virus multiplication

b. e-mail addresses substitution

c. denial-of-service attacks

d. unauthorized message alteration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?