
Chapter 4

Quiz
•
Other
•
Professional Development
•
Hard
sam foon
FREE Resource
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which three protocols use asymmetric key algorithms? (Choose three.)
Secure Shell (SSH)
Pretty Good Privacy (PGP)
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Answer explanation
Refer to Chapter 4 - Slides 9 - Symmetrical versus Asymmetrical Encryption
Four protocols use asymmetric key algorithms:
1) Internet Key Exchange (IKE), which is a fundamental component of IPsec Virtual Private Networks (VPNs).
2) Secure Socket Layer (SSL), which is a means of implementing cryptography into a web browser.
3) Secure Shell (SSH), which is a protocol that provides a secure remote access connection to network devices.
4) Pretty Good Privacy (PGP), which is a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
steganography
cryptography
data masking
Answer explanation
Refer to Chapter 4 - Slides 24 - Steganography
Steganography conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage of steganography over cryptography is that the secret message does not attract any special attention. No one would ever know that a picture actually contained a secret message by viewing the file either electronically or in hardcopy.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
WEP
DES
RSA
Diffie-Hellman (DH)
Answer explanation
Refer to Chapter 4 - Slides 7 - Public-Key Encryption
Diffie-Hellman - provides an electronic exchange method to share the secret key. Secure protocols, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Secure Shell (SSH), and Internet Protocol Security (IPsec), use Diffie-Hellman.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
symmetric
asymmetric
transposition
one-time pad
Answer explanation
Refer to Chapter 4 - Slides 5 - Overview
Asymmetric algorithms - Asymmetrical encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, and the receiver is the only one that can decrypt it using his private key. Parties exchange secure messages without needing a pre-shared key. Asymmetric algorithms are more complex. These algorithms are resource intensive and slower to execute.
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which three devices represent examples of physical access controls? (Choose three.)
locks
firewalls
swipe cards
video cameras
Answer explanation
Refer to Chapter 4 - Slides 13 - Types of Access Control
Examples of physical access controls include the following:
- Guards monitor the facility
- Fences protect the perimeter
- Motion detectors detect moving objects
- Laptop locks safeguard portable equipment
- Locked doors prevent unauthorized access
- Swipe cards allow access to restricted areas
- Guard dogs protect the facility
- Video cameras monitor a facility by collecting and recording images
- Mantraps allow access to the secured area after door 1 closes
- Alarms detect intrusion
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
hash
symmetric
asymmetric
one-time pad
Answer explanation
Refer to Chapter 4 - Slides 5 - Overview
Symmetric algorithms - These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
detective
deterrent
masking
preventive
Answer explanation
Refer to Chapter 4 - Slides 19 - Types of Security Controls
Deterrent Controls - A deterrent is the opposite of a reward. A reward encourages individuals to do the right thing, while a deterrent discourages them from doing the wrong thing. Cybersecurity professionals and organizations use deterrents to limit or mitigate an action or behavior. Deterrents do not always stop these actions.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Minecraft

Quiz
•
KG - Professional Dev...
11 questions
Quiz PUK

Quiz
•
Professional Development
11 questions
Cryptography - An Overview

Quiz
•
Professional Development
9 questions
SLOT LAD

Quiz
•
University - Professi...
15 questions
Cybersecurity Awareness Quiz

Quiz
•
Professional Development
10 questions
Topics 5 Motion & Title Graphic

Quiz
•
Professional Development
10 questions
Minecraft 1.16.4

Quiz
•
1st Grade - Professio...
10 questions
E-commerce

Quiz
•
9th Grade - Professio...
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade