
Chapter 5 Quiz

Quiz
•
Computers
•
University
•
Hard
Kevin Wong
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A user plans to use SHA-1 as part of an IPSec implementation for inbound external connections. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?
Message Digest 5 (MD5) Algorithm
Hash-based message authentication code (HMAC)
Internet Security Association and Key Management Protocol (ISAKMP)
Secure Hash Algorithm SHA-256 (256 bit)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alice and Bob use the same password to login into a website. This means both would have the exact same hash for their passwords. What could be implemented to prevent both password hashes from being the same?
hashing
salting, salt
Secure Hash Algorithm (SHA)
Message Digest 5 (MD5) Algorithm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method tries all possible passwords until a match is found?
dictionary
brute force
rainbow tables
trial-and-error method
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?
valid ID
source code
digital signature
code recognition
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Write down one criteria used for validation rule.
range
format
size
consistency
check digit
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user wants to ensure that when new users downloaded his newly created program, the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
Distribute the program on a thumb drive.
Install the program on individual computers.
Encrypt the program and require a password after it is downloaded.
Create a hash of the program file and use it to verify the integrity of the file after download
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the standard for a public key infrastructure to manage digital certificates?
public key infrastructure (PKI)
x.503
NIST-SP800
x.509
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Five pillar of information security

Quiz
•
University
10 questions
ITBP301_Chapter 02

Quiz
•
University
10 questions
Initial Assessment - CompTIA IT fundamentals

Quiz
•
University
12 questions
U0. Dynamic Data Structures

Quiz
•
University
15 questions
KEAMANAN KOMPUTER

Quiz
•
University
10 questions
DBMS

Quiz
•
University
11 questions
Final Keamanan Komputer / Sistem Keamanan Jaringan

Quiz
•
University
10 questions
Cybersecurity Fundamentals Week 2 Quiz

Quiz
•
KG - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade