PKI, DMZ & Proxy

PKI, DMZ & Proxy

University

10 Qs

quiz-placeholder

Similar activities

kuis kabel dan nirkabel

kuis kabel dan nirkabel

11th Grade - University

12 Qs

G 10- Understanding Main Memory and Cache

G 10- Understanding Main Memory and Cache

10th Grade - University

11 Qs

DB-Quiz1

DB-Quiz1

University

10 Qs

Quiz sobre Minería de Datos

Quiz sobre Minería de Datos

University

10 Qs

Contadores y Acumuladores

Contadores y Acumuladores

University

10 Qs

CLC Lesson 8&9 Quiz

CLC Lesson 8&9 Quiz

University

12 Qs

Ciberseguridad

Ciberseguridad

University

12 Qs

PKI, DMZ & Proxy

PKI, DMZ & Proxy

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

M Salman Nadeem

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is Not classified as a Man in the Middle (MiTM) or Adversary-in-the-Middle (AiTM) attack?

Sender/Source spoofing

SQL injection

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes Public Key Infrastructure (PKI)?

A framework for enforcing single sign-on in enterprise networks

A system of hardware, software, policies, and standards for managing digital certificates and public-key encryption

A protocol designed to handle secure file transfers over the Internet

A set of regulations requiring organizations to encrypt all email traffic

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

X.509 certificates typically contain which of the following pieces of information?

The user’s password

A private symmetric key

The certificate owner’s public key

The OCSP revocation list

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Certificate Authority (CA) hierarchies, the highest level of trust is usually assigned to:

Subordinate CAs

Intermediate CAs

Root CAs

Registration Authorities

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

OCSP (Online Certificate Status Protocol) is primarily used to:

Issue new certificates on demand

Revoke expired keys in real time

Determine the revocation status of digital certificates

Encrypt data transmitted between a client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DNS CAA (Certification Authority Authorization) records allow a domain owner to:

Block Domain Name System lookups

Authorize specific CAs to issue certificates for their domain

Prevent domain hijacking through DNSSEC

Configure custom SSL/TLS cipher suites

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Non-web PKI implementations, such as S/MIME, are commonly used to:

Secure email communications with digital signatures and encryption

Replace all TLS connections in web browsers

Validate the authenticity of DNS records

Implement a web-of-trust for VoIP calls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?