Module 7 (Fundamentals of Cybersecurity)

Module 7 (Fundamentals of Cybersecurity)

University

10 Qs

quiz-placeholder

Similar activities

Let's Encrypt

Let's Encrypt

University

15 Qs

CAS004: Set 3

CAS004: Set 3

University

10 Qs

Security

Security

12th Grade - University

12 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

12th Grade - University

13 Qs

Cryptography

Cryptography

University

15 Qs

Digital Signeture

Digital Signeture

University

13 Qs

Cryptographic Security Quiz

Cryptographic Security Quiz

University

11 Qs

Module 7 (Fundamentals of Cybersecurity)

Module 7 (Fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What electronically verifies the ownership of a website, server, or individual?
Digital Certificate
Certificate Authority
CRL
OCSP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which are types of Digital certificates?
Root Digital Certificate
Self-designed Certificate
Digital Certificate
Certificate Authority

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a CA?
A trusted third party that validates information.
A database used to verify the status of a certificate
A database used for real-time verification
An established trust by linking certificates back to the root.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Domain Digital Certificate verifies the identity of a website, ensuring you connect to the legitimate party.
True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are not a secure protocol.
SSL
TLS
IPsec
HTTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three key strengths of cryptographic protocols?
Confidentiality
Integrity
Authentication
All are strengths

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Weaknesses in cryptographic protocols include which of the following?
Rainbow attacks
Zero-day attacks
authentication errors
None are weaknesses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?