ISM SSP

ISM SSP

University

17 Qs

quiz-placeholder

Similar activities

Java_Quiz_Part_2

Java_Quiz_Part_2

University

12 Qs

Getting Familiar with GIT and GITHUB

Getting Familiar with GIT and GITHUB

University

15 Qs

SI vesus TI

SI vesus TI

University

20 Qs

CUESTIONARIO 3

CUESTIONARIO 3

University

14 Qs

Python: operadores y tipos de datos

Python: operadores y tipos de datos

University

18 Qs

Introduction to Programming

Introduction to Programming

University

15 Qs

P3 IAS 2 Quiz

P3 IAS 2 Quiz

University

15 Qs

CLC Lesson 4&5 Quiz

CLC Lesson 4&5 Quiz

University

12 Qs

ISM SSP

ISM SSP

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Alin Alecu

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

1) The Record Protocol within SSL provides:

a. message confidentiality

b. authentication of entities

c. transaction's non-repudiation

d. message integrity

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

2) Which one of the following protocols can be used for creating VPN tunnels?

a. SSL

b. OCSP

c. IPSec

d. PPTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3) Which of the following affirmations about the SSL protocol are true?

a. it requires changing the TCP IP stack

b. it can only he used for securing the web traffic

c. is a third level protocol

d. it uses digital certificates for parties authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

4) Which of the main advantages of virtual private networks (VPN) in comparison with frame relay based networks, leased lines or dial-up?

a. increasing security level

b. lower installation and operation costs

c. higher transfer rates

d. higher availability for network services

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

5) What are the main advantages of the web of trust model used by PGP to establish trust in a public key:

a. transitivity of trust relationships

b. avoids the necessity of key revocation if the key was compromised

c. high scalability

d. doesn't need a third trustful entity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6) Which of the following protocols can he used for the centralized management of users’ credentials?

a. RADIUS

b. ARP

c. ICMP

d. TACACS+

e. LDAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7) S/MIME provides protection against:

a. virus multiplication

b. e-mail addresses substitution

c. denial-of-service attacks

d. unauthorized message alteration

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?