Security Fundamental

Security Fundamental

University

20 Qs

quiz-placeholder

Similar activities

Cybercrime exercise

Cybercrime exercise

7th Grade - University

23 Qs

Danger online

Danger online

7th Grade - University

25 Qs

Ulangan Harian 1

Ulangan Harian 1

9th Grade - University

15 Qs

PENCEGAHAN DAN PENANGANAN MALWARE

PENCEGAHAN DAN PENANGANAN MALWARE

9th Grade - University

20 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Understanding Ethical Hacking Concepts

Understanding Ethical Hacking Concepts

University

20 Qs

Living in the IT Era: Knowledge Assessment

Living in the IT Era: Knowledge Assessment

University

16 Qs

Mengenal Jenis-Jenis Malware

Mengenal Jenis-Jenis Malware

12th Grade - University

20 Qs

Security Fundamental

Security Fundamental

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Michael Anyaeze

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature?

David's public key

Mike's public key

David's private key

Mike's private key

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

David would like to send Mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?

David's public key

Mike's public key

Mike's private key

David's private key

3.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which one of the following certificate formats is closely associated with Windows binary certificate files?

DER

PFX

P7B

PEM

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which one of the following servers is almost always an offline CA in a large PKI deployment?

Root CA

RA

Intermediate CA

Internal CA

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Davi recently obtained a wildcard certificate for *.mydomain.com. Which one of the following domains would not be covered by this certificate?

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Elizabeth is choosing a symmetric encryption algorithm for use in her organization. She would like to choose the strongest algorithm from these choices. What algorithm should she choose?

RSA

DES

3DES

AES

7.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What type of cipher operates on one character of text at a time?

Stream cipher

Bit cipher

Block cipher

Balanced cipher

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?