
Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Quiz
•
Computers
•
Professional Development
•
Easy
Trey Conn
Used 3+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
GCGA, a software development company, occasionally updates its software with major updates and minor patches. Administrators load these updates to the company website along with a hash associated with each update. Which of the following BEST describes the purpose of the hash?
Availability of updates and patches
Integrity of updates and patches
Confidentiality of updates and patches
Integrity of the application
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Users in your organization sign their emails with digital signatures. Which of the following provides integrity for these digital signatures?
Hashing
Encryption
Non-repudiation
Private key
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
While reviewing logs on a web server hosted by your organization, you notice multiple logon failures to an FTP account, but they're only happening about once every 30 minutes. You also see that the same password is being tried against the SSH account right after the FTP account logon failure. What BEST describes what is happening?
Brute force attack
Dictionary attack
Plaintext attack
Spraying attack
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
An online application requires users to log on with their email address and a password. The application encrypts the passwords in a hashed format. Which of the following can be added to decrease the likelihood that attackers can discover these passwords?
Rainbow tables
Salt
Digital signatures
Input Validation
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the primary difference between a block cipher and a stream cipher?
A stream cipher encrypts data 1 bit or 1 byte at a time
A block cipher encrypts data 1 bit or 1 byte at a time
Stream ciphers are used for symmetric encryption, but block ciphers are used for asymmetric encryption
Block ciphers are used for symmetric encryption, but stream ciphers are used for asymmetric encryption
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A developer is creating an application that will encrypt and decrypt data on mobile devices. These devices don't have a lot of processing power. Which of the following cryptographic methods has the LEAST overhead and can provide encryption for these mobile devices?
Elliptic curve cryptography
Perfect forward secrecy
Salting
Digital signatures
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
You are configuring a web server that will be used by salespeople via the Internet. Data transferred to and from the server needs to be encrypted, so you are tasked with requesting a certificate for the server. Which of the following would you MOST likely use to request the certificate?
CA
CRL
CSR
OCSP
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
IS.Qz.wk.7.set.A

Quiz
•
Professional Development
30 questions
Comp_Sec_241-270

Quiz
•
Professional Development
28 questions
Cyber Crime Investigation

Quiz
•
Professional Development
29 questions
Azure Quiz 2b

Quiz
•
Professional Development
30 questions
DDC_Midterm Quiz24

Quiz
•
Professional Development
35 questions
Database

Quiz
•
Professional Development
25 questions
HRIS Slides 1

Quiz
•
Professional Development
25 questions
SEC+ 001-025

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade