Day 2 Quiz - Cryptographic Solutions & Identity Management

Quiz
•
Professional Development
•
Professional Development
•
Medium
Standards-aligned
Robert Teney
Used 2+ times
FREE Resource
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which of the following cryptographic solutions is best suited for securing communication between two parties over an untrusted network?
Full-disk encryption
Asymmetric encryption
Secure Enclave
Key escrow
Answer explanation
Asymmetric encryption uses a pair of keys (a public key and a private key) to encrypt and decrypt data. It is well-suited for securing communications over an untrusted network, as it allows secure key exchange and the establishment of encrypted communication channels.
Tags
Objective 1.4
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which cryptographic tool would you use to securely store and manage encryption keys for a large enterprise environment?
Trusted Platform Module (TPM)
Hardware Security Module (HSM)
Steganography
Public key
Answer explanation
Hardware Security Module (HSM) is a physical device that provides secure key management and cryptographic operations. It is designed to securely generate, store, and manage encryption keys, making it ideal for enterprise environments.
Tags
Objective 1.4
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which of the following cryptographic concepts adds unique data to a password before hashing it to prevent rainbow table attacks?
Blockchain
Digital Signatures
Salting
Key Stretching
Answer explanation
Salting is the process of adding unique, random data (known as a salt) to a password before it is hashed. This technique ensures that even if two users have the same password, their hashes will be different, thus preventing rainbow table attacks. Key Stretching strengthens weak passwords by applying multiple iterations of hashing but does not add unique data to the password.
Tags
Objective 1.4
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 1.4/Day 2 -
Which certificate component is used to provide real-time status information on the validity of a digital certificate?
Certificate Revocation List (CRL)
Online Certificate Status Protocol (OCSP)
Certificate Signing Request (CSR)
Wildcard Certificate
Answer explanation
Online Certificate Status Protocol (OCSP) is a protocol used to check the real-time status of a digital certificate. It allows clients to query a CA for the validity of a certificate without having to download and parse a full CRL.
Tags
Objective 1.4
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Objective 4.5/Day 2 -
Your organization has noticed an increase in unauthorized access attempts to sensitive subnets within the internal network. As a security administrator, you need to enhance the network's security posture by modifying firewall settings. Which of the following actions would be the most appropriate to improve security?
Implement DNS filtering to block access to malicious domains.
Configure firewall rules to block all inbound traffic on non-essential ports.
Deploy agent-based web filters on all user devices.
Enable IDS/IPS to monitor trends in network traffic and update signatures regularly.
Answer explanation
Firewall rules are critical for controlling access to the network. By blocking inbound traffic on non-essential ports, you can reduce the attack surface and prevent unauthorized access to sensitive subnets.
Tags
Objective 4.5
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.5/Day 2 -
Your organization is experiencing frequent phishing attacks, and employees are accessing websites with poor reputations. As a security administrator, you need to implement a solution that can block access to these websites and protect the organization. Which of the following solutions would be most effective in this scenario?
Configure Group Policy to enforce strict password policies.
Deploy a centralized proxy server to perform URL scanning and content categorization.
Implement SELinux to enforce security policies at the operating system level.
Modify the firewall to block all outbound traffic.
Answer explanation
Centralized proxy servers are effective for controlling and monitoring web traffic. By performing URL scanning and content categorization, you can block access to websites with poor reputations and prevent phishing attacks.
Tags
Objective 4.5
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Objective 4.5/Day 2 -
Your organization has recently implemented a new email security protocol, but employees are still receiving phishing emails that appear to be from trusted internal sources. To mitigate this risk, you need to ensure that only authorized mail servers are allowed to send emails on behalf of your domain. Which of the following actions should you take?
Implement Domain-based Message Authentication Reporting and Conformance (DMARC).
Configure DomainKeys Identified Mail (DKIM) to add a digital signature to outgoing emails.
Set up Sender Policy Framework (SPF) to define authorized mail servers.
Deploy a secure email gateway to filter incoming and outgoing emails.
Answer explanation
SPF is specifically designed to identify which mail servers are permitted to send emails on behalf of your domain, helping to prevent spoofing and phishing attempts.
Tags
Objective 4.5
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
IT Fundamentals+ Network, Security Concepts & Databases

Quiz
•
Professional Development
26 questions
Day 8 Quiz - Cloud Concepts & Wireless

Quiz
•
Professional Development
27 questions
PSE-4

Quiz
•
Professional Development
20 questions
AWS Basic Knowledge check

Quiz
•
Professional Development
25 questions
IT General Controls - Set A

Quiz
•
Professional Development
19 questions
AWS ACF Módulo 4 - Segurança na nuvem

Quiz
•
Professional Development
21 questions
Security+

Quiz
•
Professional Development
27 questions
Day 10 Quiz - Physical & Network Security

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade