PKI, DMZ & Proxy

PKI, DMZ & Proxy

University

10 Qs

quiz-placeholder

Similar activities

Huawei Security

Huawei Security

University

15 Qs

Jaringan Komputer dan Internet

Jaringan Komputer dan Internet

9th Grade - University

10 Qs

Quiz Profesi dan Ketrampilan Bidang TKJ

Quiz Profesi dan Ketrampilan Bidang TKJ

10th Grade - University

10 Qs

International ICT Policies in Education

International ICT Policies in Education

University

10 Qs

ЕРАСЫЛ АХМЕТОВ ИКТ ЭКЗАМЕН 10 ВОПРОСОВ

ЕРАСЫЛ АХМЕТОВ ИКТ ЭКЗАМЕН 10 ВОПРОСОВ

University

10 Qs

Cyber CHAN1

Cyber CHAN1

University

12 Qs

PKI, DMZ & Proxy

PKI, DMZ & Proxy

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

M Salman Nadeem

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is Not classified as a Man in the Middle (MiTM) or Adversary-in-the-Middle (AiTM) attack?

Sender/Source spoofing

SQL injection

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes Public Key Infrastructure (PKI)?

A framework for enforcing single sign-on in enterprise networks

A system of hardware, software, policies, and standards for managing digital certificates and public-key encryption

A protocol designed to handle secure file transfers over the Internet

A set of regulations requiring organizations to encrypt all email traffic

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

X.509 certificates typically contain which of the following pieces of information?

The user’s password

A private symmetric key

The certificate owner’s public key

The OCSP revocation list

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Certificate Authority (CA) hierarchies, the highest level of trust is usually assigned to:

Subordinate CAs

Intermediate CAs

Root CAs

Registration Authorities

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

OCSP (Online Certificate Status Protocol) is primarily used to:

Issue new certificates on demand

Revoke expired keys in real time

Determine the revocation status of digital certificates

Encrypt data transmitted between a client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DNS CAA (Certification Authority Authorization) records allow a domain owner to:

Block Domain Name System lookups

Authorize specific CAs to issue certificates for their domain

Prevent domain hijacking through DNSSEC

Configure custom SSL/TLS cipher suites

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Non-web PKI implementations, such as S/MIME, are commonly used to:

Secure email communications with digital signatures and encryption

Replace all TLS connections in web browsers

Validate the authenticity of DNS records

Implement a web-of-trust for VoIP calls

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?