ISM SSP

ISM SSP

University

17 Qs

quiz-placeholder

Similar activities

Session 08: Array

Session 08: Array

University

16 Qs

Paraan ng Paggamit ng Wika sa Lipunan

Paraan ng Paggamit ng Wika sa Lipunan

University

15 Qs

Les roles stratégique et opérationnel du SI

Les roles stratégique et opérationnel du SI

University

20 Qs

Join by Madi

Join by Madi

University

15 Qs

3. TRANSMISION DE DATOS NIVEL DE ENLACE

3. TRANSMISION DE DATOS NIVEL DE ENLACE

University

20 Qs

KUIZ DIAGNOSTIK

KUIZ DIAGNOSTIK

11th Grade - University

20 Qs

Quiz Layanan Dasar VoIP

Quiz Layanan Dasar VoIP

12th Grade - University

14 Qs

E5-1 Data Processing  CE2

E5-1 Data Processing CE2

9th Grade - University

21 Qs

ISM SSP

ISM SSP

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Alin Alecu

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

1) The Record Protocol within SSL provides:

a. message confidentiality

b. authentication of entities

c. transaction's non-repudiation

d. message integrity

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

2) Which one of the following protocols can be used for creating VPN tunnels?

a. SSL

b. OCSP

c. IPSec

d. PPTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3) Which of the following affirmations about the SSL protocol are true?

a. it requires changing the TCP IP stack

b. it can only he used for securing the web traffic

c. is a third level protocol

d. it uses digital certificates for parties authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

4) Which of the main advantages of virtual private networks (VPN) in comparison with frame relay based networks, leased lines or dial-up?

a. increasing security level

b. lower installation and operation costs

c. higher transfer rates

d. higher availability for network services

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

5) What are the main advantages of the web of trust model used by PGP to establish trust in a public key:

a. transitivity of trust relationships

b. avoids the necessity of key revocation if the key was compromised

c. high scalability

d. doesn't need a third trustful entity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6) Which of the following protocols can he used for the centralized management of users’ credentials?

a. RADIUS

b. ARP

c. ICMP

d. TACACS+

e. LDAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7) S/MIME provides protection against:

a. virus multiplication

b. e-mail addresses substitution

c. denial-of-service attacks

d. unauthorized message alteration

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?