CASP+ Chapter 6 - Review

CASP+ Chapter 6 - Review

Professional Development

20 Qs

quiz-placeholder

Similar activities

(ICDL) IT-Security

(ICDL) IT-Security

Professional Development

16 Qs

6. Encryption and Data Recovery Quiz

6. Encryption and Data Recovery Quiz

Professional Development

16 Qs

E-ARF

E-ARF

Professional Development

15 Qs

cryptography

cryptography

Professional Development

20 Qs

Accronym #2

Accronym #2

Professional Development

23 Qs

BERTH OPERATION PLANNING 4

BERTH OPERATION PLANNING 4

Professional Development

20 Qs

company law

company law

Professional Development

20 Qs

Block Chain Technology

Block Chain Technology

Professional Development

20 Qs

CASP+ Chapter 6 - Review

CASP+ Chapter 6 - Review

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Timothy Courson

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been asked by a member of senior management to explain the importance of encryption and define what symmetric encryption offers. Which of the following offers the best explanation?

Nonrepudiation

Confidentiality

Hashing

Privacy and authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As the security administrator for your organization, you must be aware of all types of hashing algorithms. Which fat-block algorithm was developed by Ron Rivest and offers a 128-bit output

Salsa20

3DES

CHACHA

RC5

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A co-worker is concerned about the veracity of a claim because the sender of an email denies sending it. The co-worker wants a way to prove the authenticity of an email. Which would you recommend?

Hashing

Digital Signature

Symmetric encryption

Asymmetric encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A junior admin at a sister company called to report a possible exposed private key that is used for PKI transactions. The administrator would like to know the easiest way to check whether the lost key has been flagged by the system. What are you going to recommend to the administrator?

Hashing

Issuance to entities

Adding to RA

Wildcard verification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've discovvered that an expired certificate is being used repeatedly to gain logon privileges. To what list should the certificate have been added?

Wildcard verification

Expired key revocation list

Online Certificate Status Department

Certificate revocation list (CRL)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A junior admin comes to you in a panic after seeing the cost for certificates. She would like to know if there is a way to get one certificate to cover all domains and subdomains for the organization. What solution can you offer?

Wildcards

Blankety certificates

Distributed certificates

No such solution exists

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an advantage of symmetric encryption?

It's powerful

A small key works well for bulk encryption

It offers confidentiality

Key exchange is easy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?