Question #1: A symmetric encryption algorithm is BEST suited for:
Chapter 10 Understanding Cryptography and PKI

Quiz
•
Computers
•
Professional Development
•
Easy
sinav hazirlik
Used 6+ times
FREE Resource
36 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
key-exchange scalability
protecting large amounts of data
providing hashing capabilities
implementing non-repudiation
Answer explanation
Simetrik şifreleme algoritmaları büyük veri kütlelerini korumak için en uygun olanıdır.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #2: A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?
Create an OCSP
Generate a CSR
Create a CRL
Generate a .pfx file
Answer explanation
Bu görevi yerine getirmek için, kıdemli bir meslektaşın muhtemelen analiste yapması gereken İLK adımı "CSR (Certificate Signing Request) oluşturmak" olacaktır.
CSR, bir sertifika otoritesine (Certificate Authority) sunulmak üzere sunucu sertifikasının oluşturulması için kullanılan bir istektir. CSR, sunucunun kimlik bilgilerini (örneğin, sunucu adı, kuruluş adı) ve genellikle kullanılacak şifreleme algoritmasını içerir.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #3: A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plain text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?
Create DLP controls that prevent documents from leaving the network
Implement salting and hashing
Configure the web content filter to block access to the forum.
Increase password complexity requirements
Answer explanation
Bu tür veri dışa çıkarılmasının neden olduğu hasarı azaltmak için, B seçeneği olan "tuzlama ve karma kullanmak" en uygun olanıdır.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #5: A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multi cloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would BEST meet the architect's objectives?
Trusted Platform Module
laaS
HSMaaS
PaaS
Key Management Service
Answer explanation
Hizmet olarak HSM, şirket içi HSM'ye veya bulut sağlayıcısından KMS'ye bir alternatiftir. Şifreleme anahtarları nerede kullanılırsa kullanılsın, hem anahtar yönetimi için HSM düzeyinde güvenliğe hem de tek bir yönetim ortamının tutarlılığına ihtiyaç duyan kuruluşlar için idealdir. HSM cihazlarına ihtiyaç duymadan HSM dereceli anahtar depolama sağlayan Hizmet Olarak HSM, hızla uygulanır ve verileri, süreçleri ve coğrafi büyümeyi desteklemek için kolayca ölçeklenir.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #6: A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?
Unsecure protocols
Default settings
Open permissions
Weak encryption
Answer explanation
Güvenlik değerlendirmesi, DES ve 3DES'in hala yeni kurulan üretim sunucularında kullanıldığını belirlemiştir. Bu tespit, "zayıf şifreleme"yi (weak encryption) ortaya koymaktadır.
DES (Data Encryption Standard) ve 3DES (Triple Data Encryption Standard), eskimiş ve güvenlik açıkları bulunan şifreleme algoritmalarıdır. Bu algoritmaların güvenlik açıkları keşfedildiği için günümüzde güvenli kabul edilmemektedir. Daha güçlü ve modern şifreleme algoritmaları, DES ve 3DES'in yerini almıştır (örneğin, AES).
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #7: A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst’s findings, which of the following attacks is being executed?
Credential harvesting
Keylogger
Brute-force
Spraying
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #8: Given the following logs: Which of the following BEST describes the type of attack that is occurring?
Rainbow table
Dictionary
Password spraying
Pass-the-hash
Create a free account and access millions of resources
Similar Resources on Quizizz
34 questions
MCQS DIGITAL 2023-24

Quiz
•
Professional Development
31 questions
ISTQB - Agile Extension mockup exam

Quiz
•
Professional Development
41 questions
TCS NQT Mock Test 1,VERBAL ABILITY,QUANTITATIVE APTITUDE,PROGRAM

Quiz
•
Professional Development
31 questions
Network-Recap

Quiz
•
Professional Development
39 questions
AZ900-05

Quiz
•
Professional Development
40 questions
Identity with Windows Server Exam Revision

Quiz
•
Professional Development
41 questions
Final Day Quiz for ICT Skill Share

Quiz
•
4th Grade - Professio...
36 questions
Corsair Trivia #9 8/1/24

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade