Chapter 10 Understanding Cryptography and PKI
Quiz
•
Computers
•
Professional Development
•
Easy
sinav hazirlik
Used 6+ times
FREE Resource
Enhance your content in a minute
36 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #1: A symmetric encryption algorithm is BEST suited for:
key-exchange scalability
protecting large amounts of data
providing hashing capabilities
implementing non-repudiation
Answer explanation
Simetrik şifreleme algoritmaları büyük veri kütlelerini korumak için en uygun olanıdır.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #2: A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?
Create an OCSP
Generate a CSR
Create a CRL
Generate a .pfx file
Answer explanation
Bu görevi yerine getirmek için, kıdemli bir meslektaşın muhtemelen analiste yapması gereken İLK adımı "CSR (Certificate Signing Request) oluşturmak" olacaktır.
CSR, bir sertifika otoritesine (Certificate Authority) sunulmak üzere sunucu sertifikasının oluşturulması için kullanılan bir istektir. CSR, sunucunun kimlik bilgilerini (örneğin, sunucu adı, kuruluş adı) ve genellikle kullanılacak şifreleme algoritmasını içerir.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #3: A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plain text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?
Create DLP controls that prevent documents from leaving the network
Implement salting and hashing
Configure the web content filter to block access to the forum.
Increase password complexity requirements
Answer explanation
Bu tür veri dışa çıkarılmasının neden olduğu hasarı azaltmak için, B seçeneği olan "tuzlama ve karma kullanmak" en uygun olanıdır.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #5: A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multi cloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would BEST meet the architect's objectives?
Trusted Platform Module
laaS
HSMaaS
PaaS
Key Management Service
Answer explanation
Hizmet olarak HSM, şirket içi HSM'ye veya bulut sağlayıcısından KMS'ye bir alternatiftir. Şifreleme anahtarları nerede kullanılırsa kullanılsın, hem anahtar yönetimi için HSM düzeyinde güvenliğe hem de tek bir yönetim ortamının tutarlılığına ihtiyaç duyan kuruluşlar için idealdir. HSM cihazlarına ihtiyaç duymadan HSM dereceli anahtar depolama sağlayan Hizmet Olarak HSM, hızla uygulanır ve verileri, süreçleri ve coğrafi büyümeyi desteklemek için kolayca ölçeklenir.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #6: A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?
Unsecure protocols
Default settings
Open permissions
Weak encryption
Answer explanation
Güvenlik değerlendirmesi, DES ve 3DES'in hala yeni kurulan üretim sunucularında kullanıldığını belirlemiştir. Bu tespit, "zayıf şifreleme"yi (weak encryption) ortaya koymaktadır.
DES (Data Encryption Standard) ve 3DES (Triple Data Encryption Standard), eskimiş ve güvenlik açıkları bulunan şifreleme algoritmalarıdır. Bu algoritmaların güvenlik açıkları keşfedildiği için günümüzde güvenli kabul edilmemektedir. Daha güçlü ve modern şifreleme algoritmaları, DES ve 3DES'in yerini almıştır (örneğin, AES).
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #7: A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst’s findings, which of the following attacks is being executed?
Credential harvesting
Keylogger
Brute-force
Spraying
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Question #8: Given the following logs: Which of the following BEST describes the type of attack that is occurring?
Rainbow table
Dictionary
Password spraying
Pass-the-hash
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
31 questions
Year 7 Computer Science Baseline
Quiz
•
KG - Professional Dev...
35 questions
Placa-Mãe
Quiz
•
Professional Development
40 questions
Foundation_Batch_2025
Quiz
•
Professional Development
40 questions
CFGB La placa base
Quiz
•
Professional Development
40 questions
LPI Linux Essentials (40 Questions)
Quiz
•
Professional Development
32 questions
TEMA 7 y 9. MONT. PROFESOR
Quiz
•
KG - Professional Dev...
31 questions
SR Tema 9. Cuestionario
Quiz
•
Professional Development
40 questions
Data Preprocessing - 1
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Computers
10 questions
Halloween
Quiz
•
Professional Development
16 questions
Spooky Season Quiz
Quiz
•
Professional Development
5 questions
11.4.25 Student Engagement & Discourse
Lesson
•
Professional Development
50 questions
ASL Colors and Clothes
Quiz
•
KG - Professional Dev...
15 questions
Ohms Law
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
