

Network Security Domain 2: Encryption
Presentation
•
Information Technology (IT)
•
10th Grade
•
Practice Problem
•
Easy
Charles Carr
Used 12+ times
FREE Resource
20 Slides • 55 Questions
1
2
3
Multiple Choice
Encryption mainly supports which pillar of the CIA triad?
4
EFS - Encrypting Online Files
5
Multiple Choice
What tool can be used to encrypt online files in Windows?
EFS
Sync Center
Windows Defender
Active Directory
Applocker
6
Multiple Choice
Review question: What tool can be used to encrypt offline files in Windows?
EFS
Sync Center
Windows Defender
Active Directory
Applocker
7
Multiple Select
What can EFS be used to encrypt? Choose any answers that apply
Files
Drives
Folders
Apps
8
Multiple Choice
Using EFS, you can choose to encrypt the contents of file or compress them, but NOT both.
True
False
9
Multiple Choice
Generally, In what color will encrypted files show up as? [EFS 2]
Blue
Black
Green
Yellow
Red
10
Multiple Choice
Generally speaking, when you are copying/pasting a folder or moving a folder, it should keep its encryption characteristics.
True
False
11
Multiple Choice
EFS does not prevent other users signing onto the same machine from accessing encrypted content.
True
False
12
13
14
Fill in the Blanks
15
Multiple Choice
The only difference between Bitlocker and Bitlocker to Go, is that Bitlocker To Go is used for __________ drives.
hard
solid state
internal
removable
SATA
16
17
Multiple Choice
Encryption can be hardware based or software based.
True
False
18
Multiple Choice
Which choice is a hardware-based encryption tool?
SSL
TPM
TLS
EFS
19
Multiple Choice
What is the Trusted Platform Module (TPM)?
A software application that manages user passwords and other authentication features
A cloud-based storage solution for sensitive data used in high-security environments
A hardware security module that integrates secure cryptographic functions into devices
20
Multiple Choice
SSL uses a public and private key for encryption.
True
False
21
Fill in the Blanks
22
Fill in the Blanks
23
24
Fill in the Blanks
25
Multiple Choice
Digital signatures mainly support which pillar of the CIA triad?
Accounting
26
Multiple Select
What are two encryption protocols used for email? (Choose 2)
SFTP
PGP
S/MIME
TCP
EFS
27
Multiple Choice
In addition to a public key and private key, PGP uses a _____________ key to encrypt and decrypt messages.
session
message
cypher
crypto
backdoor
28
Multiple Choice
Which cryptographic protocol is used by many web browsers and email providers including Microsoft exchange to embed objects for encryption purposes?
SMTP
29
30
Fill in the Blanks
31
Multiple Choice
Which law regulates the storage and handling of patients health data?
PCI-DSS
32
Multiple Choice
Which law regulates the storage of credit card data in the United States?
PCI DSS
ECPA
HIPAA
FTCA
33
Multiple Choice
Closing unused chat windows can help prevent what type of attacks?
Man in the Middle Attacks
SQL Injection Attacks
34
Multiple Choice
Employees should get approval before posting to the Company's social media site.
True
False
35
XX
443
36
Multiple Choice
A VPN encrypts all traffic.
True
False
37
Multiple Choice
What is a VPN?
A VPN is a service that provides a private connection over a public network.
38
Match
Match the tunneling protocol to the best description.
Industry Standard. Uses IPsec
Uses IPsec. Supports VPN Reconnect
Old standard. Weak encryption.
Uses HTTPS over TCP Port 443
L2TP
IKEv2
PPTP
SSTP
L2TP
IKEv2
PPTP
SSTP
39
Multiple Choice
Review Question: Why doesn't VPN use HTTP?
HTTP is not encrypted.
40
Multiple Choice
Review Question: What is the common port number for HTTP?
143
3389
41
Multiple Choice
Which network protocol is the industry standard for VPN tunneling?
SSTP
IKEv2
42
Fill in the Blanks
43
44
Multiple Choice
Which VPN authentication form is not considered secure?
CHAP
PAP
MS-CHAPv2
EAP-MS-CHAPv2
45
Multiple Choice
Review Question: Why is PAP considered unsecure?
PAP is unsecure because it transmits in plaintext.
PAP is insecure because it uses encryption.
46
Multiple Choice
Which hashing protocol does CHAP use?
MD4
47
Multiple Choice
Which VPN authentication form can use biometrics?
CHAP
MS-CHAPv2
EAS-MS-CHAPv2
PAP
48
49
Often used at the beginning of a data transmission
To continue the e-commerce website, example, the website would store the private key on the web server. Only the we server can decrypt the data.
Private Keys
Often used at the beginning of a data transmission to encrypt data.
For example, on an e-commerce website, a public key would be sent by a web server to initiate a transaction
Public Keys
Public and Private Keys
50
Multiple Choice
Which type of key is usually used to decrypt data?
Private key
Backdoor Key
51
Multiple Choice
Why type of key would be sent to an e-commerce website's server to initiate a transaction?
A penthouse key
A backdoor key
A public key
A private key
52
One key encrypts while another key decrypts
A hash function is the result of one-way encryption that is NOT meant to be deciphered.
MD4, MD5
SHA1, SHA256
Asymmetric Encryption
The same key is used to encrypt and decrypt the data
Block ciphers adds an encryption key to a block of plaintext to scramble the data into a block of cipher text.
Stream ciphers use bit-by-bit encryption
Symmetric Encryption
Symmetric Encryption
53
Secure Shell (SSH) uses both symmetric and asymmetric encryption.
54
Multiple Choice
What is the main difference between symmetric and asymmetric encryption?
Symmetric encryption uses a single key, whereas asymmetric encryption uses a key pair.
55
Multiple Choice
Which of the following is an example of stream cipher?
56
Multiple Choice
Which of the following is a form of symmtric encryption
PGP
TSL
DES
SSL
57
Multiple Choice
Which is an example of one-way encryption protocol?
DES
PGP
SSL
58
Multiple Choice
Which type of symmetric encryption can encrypt in 128, 192, or 256 bit?
59
Multiple Choice
Review Question: What is PGP used to encrypt?
Applications
Emails
60
Multiple Choice
Review Question: What are hash functions used to encrypt?
passwords
images
videos
video files
websites
61
Digital Certificates
Used to store public keys and Information
users
organizations
serial numbers
expiration numbers
62
63
Multiple Choice
What is the only certificate format that can export a certificate and a private key?
PKCS#7
64
Multiple Choice
Which certificate format is also known as encoded binary X.509?
PKCS#7
Base-64
65
Certificate Services and PKI
Certificate Authorities
issue digital certificates
Windows server can be a CA for internal network sites.
Enterprise Root CA is at the top of the CA hierarchy
Stand-alone CA - Do not use Active Directory and do not automatically enroll visitors.
PKI (public key infrastructure)
A digital certificate system used to Create, Manage, Distribute, Use, Store, and Revoke certificates
66
Certificates
67
Multiple Choice
How can you find the certificate for a website?
Click the padlock icon in the browser's address bar
68
69
Match
Match the following
Issues digital certificates
Used to distribute keys
Verifies the identity of users
Maintains a list of revoked certificates
CA (certificate authority)
RA (registration authority)
Identity provider
CRL (certificate revocation list)
CA (certificate authority)
RA (registration authority)
Identity provider
CRL (certificate revocation list)
70
71
Multiple Choice
A security token would fall under which authentication category?
72
Multiple Choice
A security token can be software of hardware based.
True
False
73
Multiple Choice
Which is NOT an example of authentication using a security token?
Entering a username and password
A text message sent to your phone by your bank with a temporary code
Entering a number sent to an app on your cellphone
Entering a code from a physical device issued to the user
74
Multiple Choice
What is a common Windows tool used to lockdown devices?
Device Guard
75
Multiple Choice
Review Question: Code integrity checks like those used by Device Guard can be isolated from the Windows Kernel. What type of malware can affect the kernel?
Trojans
Logic Bombs
Show answer
Auto Play
Slide 1 / 75
SLIDE
Similar Resources on Wayground
67 questions
9G (2.2) Equations
Presentation
•
10th Grade
69 questions
Dynamic Equilibrium
Presentation
•
10th - 11th Grade
72 questions
Compromises
Presentation
•
10th - 11th Grade
72 questions
Unit 1 and Unit 2 Review
Presentation
•
9th Grade
70 questions
OD POTĘGI DO KRYZYSU RZECZYPOSPOLITEJ
Presentation
•
10th Grade
70 questions
Evolution by Natural Selection and The Origin of Species
Presentation
•
10th Grade
68 questions
Fun English from The Learning Link
Presentation
•
10th - 11th Grade
69 questions
Central Dogma: DNA-RNA-Protein
Presentation
•
9th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Information Technology (IT)
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
10 questions
Fire Prevention
Quiz
•
9th - 12th Grade
50 questions
STAAR English 2 Review
Quiz
•
10th Grade
20 questions
Figurative Language Review
Quiz
•
10th Grade
20 questions
Grammar
Quiz
•
9th - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
11 questions
Expectations Review
Quiz
•
9th - 12th Grade