Search Header Logo

Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Authored by Trey Conn

Computers

Professional Development

Used 3+ times

Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

GCGA, a software development company, occasionally updates its software with major updates and minor patches. Administrators load these updates to the company website along with a hash associated with each update. Which of the following BEST describes the purpose of the hash?

Availability of updates and patches

Integrity of updates and patches

Confidentiality of updates and patches

Integrity of the application

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Users in your organization sign their emails with digital signatures. Which of the following provides integrity for these digital signatures?

Hashing

Encryption

Non-repudiation

Private key

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

While reviewing logs on a web server hosted by your organization, you notice multiple logon failures to an FTP account, but they're only happening about once every 30 minutes. You also see that the same password is being tried against the SSH account right after the FTP account logon failure. What BEST describes what is happening?

Brute force attack

Dictionary attack

Plaintext attack

Spraying attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An online application requires users to log on with their email address and a password. The application encrypts the passwords in a hashed format. Which of the following can be added to decrease the likelihood that attackers can discover these passwords?

Rainbow tables

Salt

Digital signatures

Input Validation

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary difference between a block cipher and a stream cipher?

A stream cipher encrypts data 1 bit or 1 byte at a time

A block cipher encrypts data 1 bit or 1 byte at a time

Stream ciphers are used for symmetric encryption, but block ciphers are used for asymmetric encryption

Block ciphers are used for symmetric encryption, but stream ciphers are used for asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A developer is creating an application that will encrypt and decrypt data on mobile devices. These devices don't have a lot of processing power. Which of the following cryptographic methods has the LEAST overhead and can provide encryption for these mobile devices?

Elliptic curve cryptography

Perfect forward secrecy

Salting

Digital signatures

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are configuring a web server that will be used by salespeople via the Internet. Data transferred to and from the server needs to be encrypted, so you are tasked with requesting a certificate for the server. Which of the following would you MOST likely use to request the certificate?

CA

CRL

CSR

OCSP

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?