Chapter 10 Understanding Cryptography and PKI

Chapter 10 Understanding Cryptography and PKI

Professional Development

36 Qs

quiz-placeholder

Similar activities

AZ900-06

AZ900-06

Professional Development

39 Qs

Final Day Quiz for ICT Skill Share

Final Day Quiz for ICT Skill Share

4th Grade - Professional Development

41 Qs

SOAL ASJ 3

SOAL ASJ 3

Professional Development

40 Qs

CyberPatriots!

CyberPatriots!

3rd Grade - Professional Development

38 Qs

Randy's Networking Quiz 2

Randy's Networking Quiz 2

Professional Development

40 Qs

Netrust Freshers Battery Exam

Netrust Freshers Battery Exam

Professional Development

40 Qs

Network-Recap

Network-Recap

Professional Development

31 Qs

az900 bootcamp

az900 bootcamp

Professional Development

40 Qs

Chapter 10 Understanding Cryptography and PKI

Chapter 10 Understanding Cryptography and PKI

Assessment

Quiz

Computers

Professional Development

Easy

Created by

sinav hazirlik

Used 6+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #1: A symmetric encryption algorithm is BEST suited for:

key-exchange scalability

protecting large amounts of data

providing hashing capabilities

implementing non-repudiation

Answer explanation

Simetrik şifreleme algoritmaları büyük veri kütlelerini korumak için en uygun olanıdır.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #2: A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?

Create an OCSP

Generate a CSR

Create a CRL

Generate a .pfx file

Answer explanation

Bu görevi yerine getirmek için, kıdemli bir meslektaşın muhtemelen analiste yapması gereken İLK adımı "CSR (Certificate Signing Request) oluşturmak" olacaktır.

CSR, bir sertifika otoritesine (Certificate Authority) sunulmak üzere sunucu sertifikasının oluşturulması için kullanılan bir istektir. CSR, sunucunun kimlik bilgilerini (örneğin, sunucu adı, kuruluş adı) ve genellikle kullanılacak şifreleme algoritmasını içerir.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #3: A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plain text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?

Create DLP controls that prevent documents from leaving the network

Implement salting and hashing

Configure the web content filter to block access to the forum.

Increase password complexity requirements

Answer explanation

Bu tür veri dışa çıkarılmasının neden olduğu hasarı azaltmak için, B seçeneği olan "tuzlama ve karma kullanmak" en uygun olanıdır.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #5: A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multi cloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would BEST meet the architect's objectives?

Trusted Platform Module

laaS

HSMaaS

PaaS

Key Management Service

Answer explanation

Hizmet olarak HSM, şirket içi HSM'ye veya bulut sağlayıcısından KMS'ye bir alternatiftir. Şifreleme anahtarları nerede kullanılırsa kullanılsın, hem anahtar yönetimi için HSM düzeyinde güvenliğe hem de tek bir yönetim ortamının tutarlılığına ihtiyaç duyan kuruluşlar için idealdir. HSM cihazlarına ihtiyaç duymadan HSM dereceli anahtar depolama sağlayan Hizmet Olarak HSM, hızla uygulanır ve verileri, süreçleri ve coğrafi büyümeyi desteklemek için kolayca ölçeklenir.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #6: A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?

Unsecure protocols

Default settings

Open permissions

Weak encryption

Answer explanation

Güvenlik değerlendirmesi, DES ve 3DES'in hala yeni kurulan üretim sunucularında kullanıldığını belirlemiştir. Bu tespit, "zayıf şifreleme"yi (weak encryption) ortaya koymaktadır.

DES (Data Encryption Standard) ve 3DES (Triple Data Encryption Standard), eskimiş ve güvenlik açıkları bulunan şifreleme algoritmalarıdır. Bu algoritmaların güvenlik açıkları keşfedildiği için günümüzde güvenli kabul edilmemektedir. Daha güçlü ve modern şifreleme algoritmaları, DES ve 3DES'in yerini almıştır (örneğin, AES).

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Question #7: A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:

To better understand what is going on, the analyst runs a command and receives the following output:

Based on the analyst’s findings, which of the following attacks is being executed?

Credential harvesting

Keylogger

Brute-force

Spraying

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Question #8: Given the following logs: Which of the following BEST describes the type of attack that is occurring?

Rainbow table

Dictionary

Password spraying

Pass-the-hash

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?