CASP+:Chapter 9B

CASP+:Chapter 9B

University

23 Qs

quiz-placeholder

Similar activities

Computer Science Quiz

Computer Science Quiz

University

20 Qs

Arth-test

Arth-test

University

20 Qs

AHJN: Unit14-P2-Communication & Internet

AHJN: Unit14-P2-Communication & Internet

12th Grade - University

25 Qs

Quiz

Quiz

University

20 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

NETWORK SECURITY

NETWORK SECURITY

University

25 Qs

Programming Errors and Concepts

Programming Errors and Concepts

9th Grade - University

20 Qs

Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

CASP+:Chapter 9B

CASP+:Chapter 9B

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption standard is commonly associated with securing email communication?

A) SSL/TLS

B) AES-GCM

C) RSA

D) S/MIME

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which EAP method establishes an encrypted tunnel with mutual authentication using public key certificates?

A) EAP-TLS

B) PEAP

C) EAP-TTLS

D) EAP-FAST

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm uses factoring large prime numbers as its basis?

A) RSA (Rivest, Shamir, and Adleman)

B) DSA (Digital Signature Algorithm)

C) ECDSA (Elliptic-Curve Digital Signature Algorithm)

D) Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role do Key Distribution Centers (KDCs) play in the process of cryptographic key exchange?

A) Distributing session keys to parties upon request

B) Establishing a shared secret key over an insecure channel without a prior shared secret

C) Encrypting and exchanging a secret key using public-key encryption

D) Managing digital certificates containing public keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the fundamental characteristic of asymmetric algorithms, also known as public-key algorithms?

A) They use the same key for encryption and decryption.

B) They require the sender and receiver to share a secret key.

C) They utilize pairs of keys: a public key and a private key.

D) They rely on symmetric encryption for secure communication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which version of TLS is considered the most secure and should be used?

A) 1.0

B) 1.1

C) 1.2

D) 1.3

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which EAP method uses a Protected Access Credential (PAC) instead of a certificate for tunnel setup, with challenges in secure PAC distribution?

A) EAP-TLS

B) PEAP

C) EAP-TTLS

D) EAP-FAST

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?