Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Professional Development

30 Qs

quiz-placeholder

Similar activities

DDC_Midterm Quiz24

DDC_Midterm Quiz24

Professional Development

30 Qs

HRIS Slides 1

HRIS Slides 1

Professional Development

25 Qs

Computer Application "Filler" Assessment (T1a1)

Computer Application "Filler" Assessment (T1a1)

Professional Development

25 Qs

SEC+ 001-025

SEC+ 001-025

Professional Development

25 Qs

IS.Qz.wk.7.set.A

IS.Qz.wk.7.set.A

Professional Development

25 Qs

ITS 101 14 Review

ITS 101 14 Review

10th Grade - Professional Development

25 Qs

Cyber Crime Investigation

Cyber Crime Investigation

Professional Development

28 Qs

Sec+ - 10A - Implement Endpoint Security

Sec+ - 10A - Implement Endpoint Security

Professional Development

26 Qs

Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Get Certified Get Ahead SY0-601 Chapters 10 & 11 Questions

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Trey Conn

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

GCGA, a software development company, occasionally updates its software with major updates and minor patches. Administrators load these updates to the company website along with a hash associated with each update. Which of the following BEST describes the purpose of the hash?

Availability of updates and patches

Integrity of updates and patches

Confidentiality of updates and patches

Integrity of the application

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Users in your organization sign their emails with digital signatures. Which of the following provides integrity for these digital signatures?

Hashing

Encryption

Non-repudiation

Private key

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

While reviewing logs on a web server hosted by your organization, you notice multiple logon failures to an FTP account, but they're only happening about once every 30 minutes. You also see that the same password is being tried against the SSH account right after the FTP account logon failure. What BEST describes what is happening?

Brute force attack

Dictionary attack

Plaintext attack

Spraying attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An online application requires users to log on with their email address and a password. The application encrypts the passwords in a hashed format. Which of the following can be added to decrease the likelihood that attackers can discover these passwords?

Rainbow tables

Salt

Digital signatures

Input Validation

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary difference between a block cipher and a stream cipher?

A stream cipher encrypts data 1 bit or 1 byte at a time

A block cipher encrypts data 1 bit or 1 byte at a time

Stream ciphers are used for symmetric encryption, but block ciphers are used for asymmetric encryption

Block ciphers are used for symmetric encryption, but stream ciphers are used for asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A developer is creating an application that will encrypt and decrypt data on mobile devices. These devices don't have a lot of processing power. Which of the following cryptographic methods has the LEAST overhead and can provide encryption for these mobile devices?

Elliptic curve cryptography

Perfect forward secrecy

Salting

Digital signatures

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are configuring a web server that will be used by salespeople via the Internet. Data transferred to and from the server needs to be encrypted, so you are tasked with requesting a certificate for the server. Which of the following would you MOST likely use to request the certificate?

CA

CRL

CSR

OCSP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?