Day 2 Quiz - Cryptographic Solutions & Identity Management

Day 2 Quiz - Cryptographic Solutions & Identity Management

Professional Development

22 Qs

quiz-placeholder

Similar activities

Asset Management

Asset Management

Professional Development

17 Qs

IT General Controls - Set A

IT General Controls - Set A

Professional Development

25 Qs

HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

University - Professional Development

20 Qs

Intro To Business&Tech

Intro To Business&Tech

9th Grade - Professional Development

25 Qs

CITSM

CITSM

Professional Development

20 Qs

Port Numbers

Port Numbers

KG - Professional Development

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Day 3 Quiz - Network Architecture

Day 3 Quiz - Network Architecture

Professional Development

26 Qs

Day 2 Quiz - Cryptographic Solutions & Identity Management

Day 2 Quiz - Cryptographic Solutions & Identity Management

Assessment

Quiz

Professional Development

Professional Development

Medium

Objective 4.6, Objective 1.4, Objective 4.5

Standards-aligned

Created by

Robert Teney

Used 2+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 1.4/Day 2 -

Which of the following cryptographic solutions is best suited for securing communication between two parties over an untrusted network?

Full-disk encryption

Asymmetric encryption

Secure Enclave

Key escrow

Answer explanation

Asymmetric encryption uses a pair of keys (a public key and a private key) to encrypt and decrypt data. It is well-suited for securing communications over an untrusted network, as it allows secure key exchange and the establishment of encrypted communication channels.

Tags

Objective 1.4

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 1.4/Day 2 -

Which cryptographic tool would you use to securely store and manage encryption keys for a large enterprise environment?

Trusted Platform Module (TPM)

Hardware Security Module (HSM)

Steganography

Public key

Answer explanation

Hardware Security Module (HSM) is a physical device that provides secure key management and cryptographic operations. It is designed to securely generate, store, and manage encryption keys, making it ideal for enterprise environments.

Tags

Objective 1.4

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 1.4/Day 2 -

Which of the following cryptographic concepts adds unique data to a password before hashing it to prevent rainbow table attacks?

Blockchain

Digital Signatures

Salting

Key Stretching

Answer explanation

Salting is the process of adding unique, random data (known as a salt) to a password before it is hashed. This technique ensures that even if two users have the same password, their hashes will be different, thus preventing rainbow table attacks. Key Stretching strengthens weak passwords by applying multiple iterations of hashing but does not add unique data to the password.

Tags

Objective 1.4

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 1.4/Day 2 -

Which certificate component is used to provide real-time status information on the validity of a digital certificate?

Certificate Revocation List (CRL)

Online Certificate Status Protocol (OCSP)

Certificate Signing Request (CSR)

Wildcard Certificate

Answer explanation

Online Certificate Status Protocol (OCSP) is a protocol used to check the real-time status of a digital certificate. It allows clients to query a CA for the validity of a certificate without having to download and parse a full CRL.

Tags

Objective 1.4

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Objective 4.5/Day 2 -

Your organization has noticed an increase in unauthorized access attempts to sensitive subnets within the internal network. As a security administrator, you need to enhance the network's security posture by modifying firewall settings. Which of the following actions would be the most appropriate to improve security?

Implement DNS filtering to block access to malicious domains.

Configure firewall rules to block all inbound traffic on non-essential ports.

Deploy agent-based web filters on all user devices.

Enable IDS/IPS to monitor trends in network traffic and update signatures regularly.

Answer explanation

Firewall rules are critical for controlling access to the network. By blocking inbound traffic on non-essential ports, you can reduce the attack surface and prevent unauthorized access to sensitive subnets.

Tags

Objective 4.5

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.5/Day 2 -

Your organization is experiencing frequent phishing attacks, and employees are accessing websites with poor reputations. As a security administrator, you need to implement a solution that can block access to these websites and protect the organization. Which of the following solutions would be most effective in this scenario?

Configure Group Policy to enforce strict password policies.

Deploy a centralized proxy server to perform URL scanning and content categorization.

Implement SELinux to enforce security policies at the operating system level.

Modify the firewall to block all outbound traffic.

Answer explanation

Centralized proxy servers are effective for controlling and monitoring web traffic. By performing URL scanning and content categorization, you can block access to websites with poor reputations and prevent phishing attacks.

Tags

Objective 4.5

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Objective 4.5/Day 2 -

Your organization has recently implemented a new email security protocol, but employees are still receiving phishing emails that appear to be from trusted internal sources. To mitigate this risk, you need to ensure that only authorized mail servers are allowed to send emails on behalf of your domain. Which of the following actions should you take?

Implement Domain-based Message Authentication Reporting and Conformance (DMARC).

Configure DomainKeys Identified Mail (DKIM) to add a digital signature to outgoing emails.

Set up Sender Policy Framework (SPF) to define authorized mail servers.

Deploy a secure email gateway to filter incoming and outgoing emails.

Answer explanation

SPF is specifically designed to identify which mail servers are permitted to send emails on behalf of your domain, helping to prevent spoofing and phishing attempts.

Tags

Objective 4.5

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?