SYO 701 CRYPTOGRAPHY Module FC-1

SYO 701 CRYPTOGRAPHY Module FC-1

University

20 Qs

quiz-placeholder

Similar activities

Security

Security

University - Professional Development

20 Qs

Administration Database

Administration Database

University - Professional Development

15 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

Wireless Networking Configuration

Wireless Networking Configuration

University

15 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Switch Security Configuration

Switch Security Configuration

University

15 Qs

J836 Recap 5.4.3 Prevention Measures

J836 Recap 5.4.3 Prevention Measures

10th Grade - University

22 Qs

SYO 701 INTRO TO SECURITY Module FC-1

SYO 701 INTRO TO SECURITY Module FC-1

University

20 Qs

SYO 701 CRYPTOGRAPHY Module FC-1

SYO 701 CRYPTOGRAPHY Module FC-1

Assessment

Quiz

Computers

University

Hard

Created by

Wayground Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

266. A software development team asked a security administrator to recommend techniques that should be used to reduce the chances of the software being reverse engineered. Which of the following should the security administrator recommend?

A. Implementing strong encryption methods

B. Performing code obfuscation

C. Using a secure coding standard

D. Conducting regular security audits

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

196. A systems administrator uses a key to encrypt a message being sent to a peer in a different branch office. The peer then uses the same key to decrypt the message. Which of the following describes this example?

A. Symmetric

B. Asymmetric

C. Hashing

D. Public Key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

231. Which of the following security measures is required when using a cloud-based platform for IoT management?

A. Encrypted connection

B. Open connection

C. Unsecured API access

D. Plain text communication

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

275. Which of the following considerations is the most important regarding cryptography used in an IoT device?

A. Resource constraints

B. User interface design

C. Data storage capacity

D. Network speed

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

360. A security administrator recently reset local passwords and the following values were recorded in the system: Which of the following in the security administrator most likely protecting against?

A. SQL injection attacks

B. Cross-site scripting (XSS)

C. Pass-the-hash attacks

D. Denial of Service (DoS) attacks

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

208. An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?

A. Encrypting

B. Hashing

C. Backing up

D. Tokenization

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

333. A security administrator identifies an application that is storing data using MD5. Which of the following best identifies the vulnerability likely present in the application?

A. Cryptographic

B. Network

C. Application Logic

D. Configuration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?