Search Header Logo
Network Security Domain 2: Encryption

Network Security Domain 2: Encryption

Assessment

Presentation

Information Technology (IT)

10th Grade

Practice Problem

Easy

Created by

Charles Carr

Used 12+ times

FREE Resource

20 Slides • 55 Questions

1

media

2

media

3

Multiple Choice

Encryption mainly supports which pillar of the CIA triad?

1
Confidentiality
2
Authentication
3
Availability
4
Integrity

4

media

EFS - Encrypting Online Files

5

Multiple Choice

What tool can be used to encrypt online files in Windows?

1

EFS

2

Sync Center

3

Windows Defender

4

Active Directory

5

Applocker

6

Multiple Choice

Review question: What tool can be used to encrypt offline files in Windows?

1

EFS

2

Sync Center

3

Windows Defender

4

Active Directory

5

Applocker

7

Multiple Select

What can EFS be used to encrypt? Choose any answers that apply

1

Files

2

Drives

3

E-mail

4

Folders

5

Apps

8

Multiple Choice

Using EFS, you can choose to encrypt the contents of file or compress them, but NOT both.

1

True

2

False

9

Multiple Choice

Generally, In what color will encrypted files show up as? [EFS 2]

1

Blue

2

Black

3

Green

4

Yellow

5

Red

10

Multiple Choice

Generally speaking, when you are copying/pasting a folder or moving a folder, it should keep its encryption characteristics.

1

True

2

False

11

Multiple Choice

EFS does not prevent other users signing onto the same machine from accessing encrypted content.

1

True

2

False

12

media

13

media

14

Fill in the Blanks

15

Multiple Choice

The only difference between Bitlocker and Bitlocker to Go, is that Bitlocker To Go is used for __________ drives.

1

hard

2

solid state

3

internal

4

removable

5

SATA

16

media

17

Multiple Choice

Encryption can be hardware based or software based.

1

True

2

False

18

Multiple Choice

Which choice is a hardware-based encryption tool?

1

SSL

2

TPM

3

TLS

4

EFS

19

Multiple Choice

What is the Trusted Platform Module (TPM)?

1

A software application that manages user passwords and other authentication features

2

A cloud-based storage solution for sensitive data used in high-security environments

3
A type of network security protocol.
4

A hardware security module that integrates secure cryptographic functions into devices

20

Multiple Choice

SSL uses a public and private key for encryption.

1

True

2

False

21

Fill in the Blanks

22

Fill in the Blanks

23

media

24

Fill in the Blanks

25

Multiple Choice

Digital signatures mainly support which pillar of the CIA triad?

1
Integrity
2

Accounting

3
Availability
4
Confidentiality

26

Multiple Select

What are two encryption protocols used for email? (Choose 2)

1

SFTP

2

PGP

3

S/MIME

4

TCP

5

EFS

27

Multiple Choice

In addition to a public key and private key, PGP uses a _____________ key to encrypt and decrypt messages.

1

session

2

message

3

cypher

4

crypto

5

backdoor

28

Multiple Choice

Which cryptographic protocol is used by many web browsers and email providers including Microsoft exchange to embed objects for encryption purposes?

1
SSH
2
S/MIME
3
TLS
4
PGP
5

SMTP

29

media

30

Fill in the Blanks

31

Multiple Choice

Which law regulates the storage and handling of patients health data?

1
HITECH
2
GDPR
3
FERPA
4
HIPAA
5

PCI-DSS

32

Multiple Choice

Which law regulates the storage of credit card data in the United States?

1

PCI DSS

2

ECPA

3

HIPAA

4

FTCA

33

Multiple Choice

Closing unused chat windows can help prevent what type of attacks?

1

Man in the Middle Attacks

2
Phishing attacks
3
Malware installation attacks
4

SQL Injection Attacks

34

Multiple Choice

Employees should get approval before posting to the Company's social media site.

1

True

2

False

35

media

​XX

​443

36

Multiple Choice

A VPN encrypts all traffic.

1

True

2

False

37

Multiple Choice

What is a VPN?

1
A VPN is a type of antivirus software.
2
A VPN is a hardware device that boosts Wi-Fi signal.
3
A VPN is a social media platform for networking.
4

A VPN is a service that provides a private connection over a public network.

38

Match

Match the tunneling protocol to the best description.

Industry Standard. Uses IPsec

Uses IPsec. Supports VPN Reconnect

Old standard. Weak encryption.

Uses HTTPS over TCP Port 443

L2TP

IKEv2

PPTP

SSTP

39

Multiple Choice

Review Question: Why doesn't VPN use HTTP?

1
VPN uses HTTP for encryption purposes.
2
HTTP is faster than VPN protocols.
3
VPN is designed specifically for web browsing.
4

HTTP is not encrypted.

40

Multiple Choice

Review Question: What is the common port number for HTTP?

1

143

2
21
3
80
4
443
5

3389

41

Multiple Choice

Which network protocol is the industry standard for VPN tunneling?

1
L2TP
2
PPTP
3

SSTP

4

IKEv2

42

Fill in the Blanks

43

media

44

Multiple Choice

Which VPN authentication form is not considered secure?

1

CHAP

2

PAP

3

MS-CHAPv2

4

EAP-MS-CHAPv2

45

Multiple Choice

Review Question: Why is PAP considered unsecure?

1

PAP is unsecure because it transmits in plaintext.

2

PAP is insecure because it uses encryption.

3
PAP requires a strong password policy to be secure.
4
PAP is secure due to its use of digital certificates.

46

Multiple Choice

Which hashing protocol does CHAP use?

1
MD5
2
SHA-256
3
bcrypt
4
SHA-1
5

MD4

47

Multiple Choice

Which VPN authentication form can use biometrics?

1

CHAP

2

MS-CHAPv2

3

EAS-MS-CHAPv2

4

PAP

48

media

49

  • Often used at the beginning of a data transmission

  • To continue the e-commerce website, example, the website would store the private key on the web server. Only the we server can decrypt the data.

Private Keys

  • Often used at the beginning of a data transmission to encrypt data.

  • ​For example, on an e-commerce website, a public key would be sent by a web server to initiate a transaction

Public Keys

Public and Private Keys

50

Multiple Choice

Which type of key is usually used to decrypt data?

1
Public key
2

Private key

3

Backdoor Key

4
Hash key

51

Multiple Choice

Why type of key would be sent to an e-commerce website's server to initiate a transaction?

1

A penthouse key

2

A backdoor key

3

A public key

4

A private key

52

  • One key encrypts while another key decrypts

  • A hash function is the result of one-way encryption that is NOT meant to be deciphered.

    • MD4, MD5

    • SHA1, SHA256

Asymmetric Encryption

  • The same key is used to encrypt and decrypt the data

  • Block ciphers adds an encryption key to a block of plaintext to scramble the data into a block of cipher text.

  • Stream ciphers use bit-by-bit encryption

Symmetric Encryption

Symmetric Encryption

53

media

Secure Shell (SSH) uses both symmetric and asymmetric encryption.

54

Multiple Choice

What is the main difference between symmetric and asymmetric encryption?

1
Symmetric encryption is used for digital signatures, while asymmetric is for data encryption.
2
Asymmetric encryption is faster than symmetric encryption in all cases.
3

Symmetric encryption uses a single key, whereas asymmetric encryption uses a key pair.

4
Symmetric encryption uses multiple keys, while asymmetric uses one key.

55

Multiple Choice

Which of the following is an example of stream cipher?

1
AES
2
DES
3
Blowfish
4
RC4

56

Multiple Choice

Which of the following is a form of symmtric encryption

1

PGP

2

TSL

3

DES

4

SSL

57

Multiple Choice

Which is an example of one-way encryption protocol?

1
SHA-256
2

DES

3

PGP

4

SSL

58

Multiple Choice

Which type of symmetric encryption can encrypt in 128, 192, or 256 bit?

1
DES (Data Encryption Standard)
2
AES (Advanced Encryption Standard)
3
RC4 (Rivest Cipher 4)
4
Blowfish

59

Multiple Choice

Review Question: What is PGP used to encrypt?

1

Applications

2
Social media posts
3

Emails

4
Text messages

60

Multiple Choice

Review Question: What are hash functions used to encrypt?

1

passwords

2

images

3

videos

4

video files

5

websites

61

Digital Certificates

Used to store public keys and Information

  • users

  • organizations

  • serial numbers

  • expiration numbers

62

media

63

Multiple Choice

What is the only certificate format that can export a certificate and a private key?

1
PKCS#12
2
PFX
3
DER
4
PEM
5

PKCS#7

64

Multiple Choice

Which certificate format is also known as encoded binary X.509?

1
DER
2

PKCS#7

3
PKCS#12
4

Base-64

65

Certificate Services and PKI

  • Certificate Authorities

    • issue digital certificates

    • Windows server can be a CA for internal network sites.

    • Enterprise Root CA is at the top of the CA hierarchy

    • Stand-alone CA - Do not use Active Directory and do not automatically enroll visitors.


  • ​PKI (public key infrastructure)

    • A digital certificate system used to Create, Manage, Distribute, Use, Store, and Revoke certificates

66

media

Certificates

media

67

Multiple Choice

How can you find the certificate for a website?

1

Click the padlock icon in the browser's address bar

2
Contact the website owner for certificate details.
3
Look for a certificate in the website's source code.
4
Check the website's footer for a certificate link.

68

media

69

Match

Match the following

Issues digital certificates

Used to distribute keys

Verifies the identity of users

Maintains a list of revoked certificates

CA (certificate authority)

RA (registration authority)

Identity provider

CRL (certificate revocation list)

70

media

71

Multiple Choice

A security token would fall under which authentication category?

1
Something you have
2
Something you do
3
Something you are
4
Something you know

72

Multiple Choice

A security token can be software of hardware based.

1

True

2

False

73

Multiple Choice

Which is NOT an example of authentication using a security token?

1

Entering a username and password

2

A text message sent to your phone by your bank with a temporary code

3

Entering a number sent to an app on your cellphone

4

Entering a code from a physical device issued to the user

74

Multiple Choice

What is a common Windows tool used to lockdown devices?

1
Device Manager
2
Control Panel
3
Task Manager
4

Device Guard

75

Multiple Choice

Review Question: Code integrity checks like those used by Device Guard can be isolated from the Windows Kernel. What type of malware can affect the kernel?

1
Rootkits
2
Viruses
3

Trojans

4
Worms
5

Logic Bombs

media

Show answer

Auto Play

Slide 1 / 75

SLIDE