
Chapter 10 Understanding Cryptography and PKI
Authored by sinav hazirlik
Computers
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
36 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #1: A symmetric encryption algorithm is BEST suited for:
key-exchange scalability
protecting large amounts of data
providing hashing capabilities
implementing non-repudiation
Answer explanation
Simetrik şifreleme algoritmaları büyük veri kütlelerini korumak için en uygun olanıdır.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #2: A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?
Create an OCSP
Generate a CSR
Create a CRL
Generate a .pfx file
Answer explanation
Bu görevi yerine getirmek için, kıdemli bir meslektaşın muhtemelen analiste yapması gereken İLK adımı "CSR (Certificate Signing Request) oluşturmak" olacaktır.
CSR, bir sertifika otoritesine (Certificate Authority) sunulmak üzere sunucu sertifikasının oluşturulması için kullanılan bir istektir. CSR, sunucunun kimlik bilgilerini (örneğin, sunucu adı, kuruluş adı) ve genellikle kullanılacak şifreleme algoritmasını içerir.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #3: A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plain text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?
Create DLP controls that prevent documents from leaving the network
Implement salting and hashing
Configure the web content filter to block access to the forum.
Increase password complexity requirements
Answer explanation
Bu tür veri dışa çıkarılmasının neden olduğu hasarı azaltmak için, B seçeneği olan "tuzlama ve karma kullanmak" en uygun olanıdır.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #5: A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multi cloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would BEST meet the architect's objectives?
Trusted Platform Module
laaS
HSMaaS
PaaS
Key Management Service
Answer explanation
Hizmet olarak HSM, şirket içi HSM'ye veya bulut sağlayıcısından KMS'ye bir alternatiftir. Şifreleme anahtarları nerede kullanılırsa kullanılsın, hem anahtar yönetimi için HSM düzeyinde güvenliğe hem de tek bir yönetim ortamının tutarlılığına ihtiyaç duyan kuruluşlar için idealdir. HSM cihazlarına ihtiyaç duymadan HSM dereceli anahtar depolama sağlayan Hizmet Olarak HSM, hızla uygulanır ve verileri, süreçleri ve coğrafi büyümeyi desteklemek için kolayca ölçeklenir.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #6: A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?
Unsecure protocols
Default settings
Open permissions
Weak encryption
Answer explanation
Güvenlik değerlendirmesi, DES ve 3DES'in hala yeni kurulan üretim sunucularında kullanıldığını belirlemiştir. Bu tespit, "zayıf şifreleme"yi (weak encryption) ortaya koymaktadır.
DES (Data Encryption Standard) ve 3DES (Triple Data Encryption Standard), eskimiş ve güvenlik açıkları bulunan şifreleme algoritmalarıdır. Bu algoritmaların güvenlik açıkları keşfedildiği için günümüzde güvenli kabul edilmemektedir. Daha güçlü ve modern şifreleme algoritmaları, DES ve 3DES'in yerini almıştır (örneğin, AES).
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #7: A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst’s findings, which of the following attacks is being executed?
Credential harvesting
Keylogger
Brute-force
Spraying
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #8: Given the following logs: Which of the following BEST describes the type of attack that is occurring?
Rainbow table
Dictionary
Password spraying
Pass-the-hash
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
37 questions
Hardware y Software
Quiz
•
Professional Development
40 questions
C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)
Quiz
•
University - Professi...
40 questions
HTML CSS JS Teacher Assessment
Quiz
•
Professional Development
35 questions
Unit 5 CH 3 and 4
Quiz
•
Professional Development
39 questions
CITL3 Review
Quiz
•
Professional Development
36 questions
Computer Essentials Practice Quiz
Quiz
•
Professional Development
36 questions
Comunicació empresarial i atenció al client. RA1, RA2 i RA3
Quiz
•
Professional Development
40 questions
CTFL Mock Test -1
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...