ISM SSP

ISM SSP

University

17 Qs

quiz-placeholder

Similar activities

Comercio Electronico

Comercio Electronico

University

14 Qs

QUIZ PENGEMBANGAN PERANGKAT LUNAK DAN GIM

QUIZ PENGEMBANGAN PERANGKAT LUNAK DAN GIM

10th Grade - University

15 Qs

Exam Entornos Virtuales de Aprendizaje

Exam Entornos Virtuales de Aprendizaje

University

15 Qs

четам ба😎

четам ба😎

University

15 Qs

IP - Clase - binarios - Conceptos

IP - Clase - binarios - Conceptos

University

17 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

RM_13. nedelja

RM_13. nedelja

University

17 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

20 Qs

ISM SSP

ISM SSP

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Alin Alecu

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

1) The Record Protocol within SSL provides:

a. message confidentiality

b. authentication of entities

c. transaction's non-repudiation

d. message integrity

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

2) Which one of the following protocols can be used for creating VPN tunnels?

a. SSL

b. OCSP

c. IPSec

d. PPTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3) Which of the following affirmations about the SSL protocol are true?

a. it requires changing the TCP IP stack

b. it can only he used for securing the web traffic

c. is a third level protocol

d. it uses digital certificates for parties authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

4) Which of the main advantages of virtual private networks (VPN) in comparison with frame relay based networks, leased lines or dial-up?

a. increasing security level

b. lower installation and operation costs

c. higher transfer rates

d. higher availability for network services

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

5) What are the main advantages of the web of trust model used by PGP to establish trust in a public key:

a. transitivity of trust relationships

b. avoids the necessity of key revocation if the key was compromised

c. high scalability

d. doesn't need a third trustful entity

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6) Which of the following protocols can he used for the centralized management of users’ credentials?

a. RADIUS

b. ARP

c. ICMP

d. TACACS+

e. LDAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7) S/MIME provides protection against:

a. virus multiplication

b. e-mail addresses substitution

c. denial-of-service attacks

d. unauthorized message alteration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?