Search Header Logo

ICS CIE-III

Authored by Dipali Pawar

Engineering

University

Used 4+ times

ICS CIE-III
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

  1. 1.What is the primary purpose of a Public Key Infrastructure (PKI)?

To generate symmetric keys

To manage and distribute digital certificates and public keys

To encrypt emails only

To monitor network traffic

2.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

  1. 2.Which of the following is not a field in an X.509 digital certificate?

Serial Number

Issuer Name

Symmetric Key

Subject Name

3.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

3.The Needham-Schroeder protocol is used for:


Error detection

Authentication using symmetric keys

Routing table management

File encryption

4.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

4.In Kerberos authentication, the Ticket Granting Server (TGS) is responsible for:

Generating session keys for users

Encrypting all network traffic

Issuing service tickets to authenticated users

Storing public keys

5.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

5.Which feature is inherent to IPv6 and optional in IPv4?

ARP

IPsec support

Broadcast addressing

NAT

6.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

6.HTTPS uses which protocol to provide secure communication over HTTP?

TLS/SSL

IPsec

Kerberos

PGP

7.

MULTIPLE CHOICE QUESTION

30 mins • 1 pt

7.Which of the following uses a combination of symmetric and asymmetric encryption for securing emails?

FTP

PGP

HTTP

Telnet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?