PKI, DMZ & Proxy

PKI, DMZ & Proxy

University

10 Qs

quiz-placeholder

Similar activities

CySA+ Days 4-5

CySA+ Days 4-5

University

14 Qs

Huawei Security

Huawei Security

University

15 Qs

Network Topologies and Key Network Components

Network Topologies and Key Network Components

10th Grade - University

15 Qs

Test

Test

University

15 Qs

PKI, DMZ & Proxy

PKI, DMZ & Proxy

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

M Salman Nadeem

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is Not classified as a Man in the Middle (MiTM) or Adversary-in-the-Middle (AiTM) attack?

Sender/Source spoofing

SQL injection

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes Public Key Infrastructure (PKI)?

A framework for enforcing single sign-on in enterprise networks

A system of hardware, software, policies, and standards for managing digital certificates and public-key encryption

A protocol designed to handle secure file transfers over the Internet

A set of regulations requiring organizations to encrypt all email traffic

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

X.509 certificates typically contain which of the following pieces of information?

The user’s password

A private symmetric key

The certificate owner’s public key

The OCSP revocation list

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Certificate Authority (CA) hierarchies, the highest level of trust is usually assigned to:

Subordinate CAs

Intermediate CAs

Root CAs

Registration Authorities

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

OCSP (Online Certificate Status Protocol) is primarily used to:

Issue new certificates on demand

Revoke expired keys in real time

Determine the revocation status of digital certificates

Encrypt data transmitted between a client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DNS CAA (Certification Authority Authorization) records allow a domain owner to:

Block Domain Name System lookups

Authorize specific CAs to issue certificates for their domain

Prevent domain hijacking through DNSSEC

Configure custom SSL/TLS cipher suites

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Non-web PKI implementations, such as S/MIME, are commonly used to:

Secure email communications with digital signatures and encryption

Replace all TLS connections in web browsers

Validate the authenticity of DNS records

Implement a web-of-trust for VoIP calls

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?