
PKI, DMZ & Proxy
Quiz
•
Information Technology (IT)
•
University
•
Practice Problem
•
Hard
M Salman Nadeem
Used 3+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is Not classified as a Man in the Middle (MiTM) or Adversary-in-the-Middle (AiTM) attack?
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best describes Public Key Infrastructure (PKI)?
A framework for enforcing single sign-on in enterprise networks
A system of hardware, software, policies, and standards for managing digital certificates and public-key encryption
A protocol designed to handle secure file transfers over the Internet
A set of regulations requiring organizations to encrypt all email traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
X.509 certificates typically contain which of the following pieces of information?
The user’s password
A private symmetric key
The certificate owner’s public key
The OCSP revocation list
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In Certificate Authority (CA) hierarchies, the highest level of trust is usually assigned to:
Subordinate CAs
Intermediate CAs
Root CAs
Registration Authorities
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
OCSP (Online Certificate Status Protocol) is primarily used to:
Issue new certificates on demand
Revoke expired keys in real time
Determine the revocation status of digital certificates
Encrypt data transmitted between a client and server
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
DNS CAA (Certification Authority Authorization) records allow a domain owner to:
Block Domain Name System lookups
Authorize specific CAs to issue certificates for their domain
Prevent domain hijacking through DNSSEC
Configure custom SSL/TLS cipher suites
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Non-web PKI implementations, such as S/MIME, are commonly used to:
Secure email communications with digital signatures and encryption
Replace all TLS connections in web browsers
Validate the authenticity of DNS records
Implement a web-of-trust for VoIP calls
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
The Linux Vault
Quiz
•
University
15 questions
ITEC 70 - Quiz # 2
Quiz
•
University
10 questions
Chapter 5 Database Management Quiz
Quiz
•
University
10 questions
MongoDB Concepts 1
Quiz
•
University
14 questions
1st Quiz
Quiz
•
University
15 questions
G4-Microprocessors and Their Uses
Quiz
•
4th Grade - University
10 questions
7 класс программирование
Quiz
•
7th Grade - University
10 questions
Chapter Quiz
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
5 questions
Helping Build the Internet: Valerie Thomas | Great Minds
Interactive video
•
11th Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
19 questions
Review2-TEACHER
Quiz
•
University
15 questions
Pre2_STUDENT
Quiz
•
University
20 questions
Ch. 7 Quadrilateral Quiz Review
Quiz
•
KG - University
