Module 17

Module 17

KG

11 Qs

quiz-placeholder

Similar activities

Driving Safety Quiz 11-20

Driving Safety Quiz 11-20

9th Grade

15 Qs

Physical Science Test 1

Physical Science Test 1

6th Grade

10 Qs

Circuitul apei in natura

Circuitul apei in natura

6th - 8th Grade

10 Qs

astronomi

astronomi

12th Grade

14 Qs

Cambios de Estado

Cambios de Estado

University

16 Qs

Modes of transport

Modes of transport

KG

10 Qs

Bridges

Bridges

4th - 8th Grade

10 Qs

motion-8  for  class 9th

motion-8 for class 9th

9th - 10th Grade

10 Qs

Module 17

Module 17

Assessment

Quiz

Physics

KG

Easy

Created by

who areyou

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)

  • digital certificates

  • intrusion prevention system

  • pre-shared key generation

  • certificate authority

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of code signing?


  • integrity of source .EXE files

  • data encryption

  • source identity secrecy

  • reliable transfer of data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the use of certificate classes in the PKI?

  • Email security is provided by the vendor, not by a certificate.

  • The lower the class number, the more trusted the certificate.

A vendor must issue only one class of certificates when acting as a CA

  • A class 5 certificate is more trustworthy than a class 4 certificate.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role does an RA play in PKI?

  • a root CA

  • a super CA

  • a subordinate CA

  • a backup root CA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol uses X.509 certificates to support mail protection performed by mail agents?

IPsec

SSL

S/MIME

EAP-TLS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is used to query the revocation status of an X.509 certificate?

SSL

EAP

OCSP

LDAP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?

  • HTTPS traffic does not require authentication.

  • HTTPS traffic enables end-to-end encryption.

  • HTTPS traffic is much faster than HTTP traffic.

  • HTTPS traffic can carry a much larger data payload than HTTP can carry.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?