CASP+:Chapter 9B

CASP+:Chapter 9B

University

23 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

Data Comm 4

Data Comm 4

University

20 Qs

Security+ Wireless Security Quiz

Security+ Wireless Security Quiz

University

20 Qs

network security-1

network security-1

12th Grade - University

20 Qs

IAS QUIZ 12

IAS QUIZ 12

University

25 Qs

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

19 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

CASP+:Chapter 9B

CASP+:Chapter 9B

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption standard is commonly associated with securing email communication?

A) SSL/TLS

B) AES-GCM

C) RSA

D) S/MIME

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which EAP method establishes an encrypted tunnel with mutual authentication using public key certificates?

A) EAP-TLS

B) PEAP

C) EAP-TTLS

D) EAP-FAST

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which algorithm uses factoring large prime numbers as its basis?

A) RSA (Rivest, Shamir, and Adleman)

B) DSA (Digital Signature Algorithm)

C) ECDSA (Elliptic-Curve Digital Signature Algorithm)

D) Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role do Key Distribution Centers (KDCs) play in the process of cryptographic key exchange?

A) Distributing session keys to parties upon request

B) Establishing a shared secret key over an insecure channel without a prior shared secret

C) Encrypting and exchanging a secret key using public-key encryption

D) Managing digital certificates containing public keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the fundamental characteristic of asymmetric algorithms, also known as public-key algorithms?

A) They use the same key for encryption and decryption.

B) They require the sender and receiver to share a secret key.

C) They utilize pairs of keys: a public key and a private key.

D) They rely on symmetric encryption for secure communication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which version of TLS is considered the most secure and should be used?

A) 1.0

B) 1.1

C) 1.2

D) 1.3

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which EAP method uses a Protected Access Credential (PAC) instead of a certificate for tunnel setup, with challenges in secure PAC distribution?

A) EAP-TLS

B) PEAP

C) EAP-TTLS

D) EAP-FAST

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?