41. El acceso simplificado a múltiples aplicaciones seguras es proporcionado por el enfoque: (Streamlined access to multiple secure applications is provided by which approach):
Seguridad de la Red Grupo 5

Quiz
•
Computers
•
University
•
Hard
Odessa Aranda
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A. OTP (One-Time Password)
B. CHAP (Challenge Handshake Authentication Protocol)
C. Negación Implícita (Implicit Deny)
D. SSO (Single sign-on)
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
42. ¿Cuál de los siguientes factores de autenticación podría agregarse a una contraseña para proporcionar autenticación multifactor?
(Which of the following authentication factors could be added to a password in order to provide multi-factor authentication?)
A. PIN
B. Smart Card
C. Passphrase
D. Username
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
43. Cuando un usuario crea un archivo, tiene la capacidad de compartir ese archivo con otros usuarios. Este es un ejemplo de qué tipo de modelo de control de acceso?
(When a user creates a file, they then have the ability to share that file with other users. This is an example of what type of access control model?)
A. DAC
B. MAC
C. RBAC
D. SAML
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
44. Un usuario quiere enviar un mensaje seguro a otro usuario. ¿Qué clave se utilizará para cifrar el mensaje?
(A user wants to send a secure message to another user. Which key will be used in order to encrypt the message?)
A. The sender´s private key
B. The receiver´s private key
C. The receiver´s public key
D. The sender´s public key
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
45. ¿Cuál de los siguientes algoritmos criptográficos se puede usar para proporcionar integridad de datos?
(Which of the following cryptographic algorithms can be used to provide data integrity?)
A. ECC
B. RSA
C. MD5
D. RC4
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
46. Los certificados son emitidos por las Autoridades de Certificación (CA) de acuerdo con el estándar:
(Certificates are issued by Certificate Authorities (CAs) in accordance with which standard?)
A. X.509
B. X.500
C. X.501
D. AES
7.
MULTIPLE SELECT QUESTION
10 sec • 1 pt
47. ¿Cuál de los siguientes algoritmos criptográficos se puede usar para proporcionar confidencialidad de datos? (Which of the following cryptographic algorithms can be used to provide data confidentiality? (CHOOSE TWO))
A. 3DES
B.SHA-1
C. RIPEMD
D. AES
Create a free account and access millions of resources
Similar Resources on Quizizz
6 questions
Croteau SY110 L18&19 AY25

Quiz
•
University
15 questions
SOM - Comandos LINUX

Quiz
•
9th Grade - University
10 questions
Programación Móvil I Parte 1

Quiz
•
University
15 questions
Cryptology

Quiz
•
9th Grade - University
15 questions
Cryptography

Quiz
•
University
10 questions
Chapter 6 (Fundamentals of Cybersecurity

Quiz
•
University
13 questions
navegador vs motor de busqueda

Quiz
•
University
10 questions
Taller de SO C3 - NFS

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade