Skip to main content

IS5403 Week 3 All Quizezz

Simulation Lab 1 Answers :


1) Encryption

2) Cipher

3) Either of  these

4) All of these


Simulation Lab 2 Answers :


1) 5 and 3

2) 3

3) D

4) A

5) D and N


Simulation Lab 3 Answer : 


1)  All of these

2) Online Certificate Status Protocol (OCSP)

3) Secure Shell (SSH)

4) Key escrow

5)  2048-bit RSA


3
Question

Which of the following statements are true for application whitelisting and blacklisting? [Choose all that apply]

Correct
 
3 of 8
4
Question

Which mobile device management method allows the employee to purchase a mobile device, but the organization has complete control over the device?

Correct
 
4 of 8
5
Question

To prevent the spread of an attack, which of the following methods of isolation can be used? [Choose all that apply]

Correct
 
5 of 8
6
Question

When implementing segmentation as a proactive measure, which of the following types of segments exist on a network? [Choose all that apply]

Correct
 
6 of 8
7
Question

If two segments need to talk to each other in a segmented network, which of the following is required?

Correct


3
Question

How many keys are required in asymmetric encryption?

Correct
 
3 of 8
4
Question

What is the key length of the Data Encryption Standard (DES) algorithm?

Correct
 
4 of 8
5
Question

In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate?

Correct
 
5 of 8
6
Question

What is the minimum key size in Elliptical Curve Cryptography (ECC)?

Correct
 
6 of 8
7
Question

Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply]

Correct


3
Question

Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions?

Correct
 
3 of 8
4
Question

Which of the following is a condition that is shown as a result when it does not exist?

Correct
 
4 of 8
5
Question

Which of the following is used for continuous monitoring of logs?

Correct
 
5 of 8
6
Question

Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)?

Correct
 
6 of 8
7
Question

Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities?

Correct
7
Question

Which of the following entity in the certificate authority (CA) hierarchy validates the certificate request from a client?

Correct
 
7 of 12
8
Question

Before a user requests a certificate from a CA, which of the following tasks must be completed?

Correct
 
8 of 12
9
Question

Which of the following certificates should you use with a Web server for testing purposes?

Correct
 
9 of 12
10
Question

Which type of certificate file format contains private and public keys and is protected by a password?

Correct
 
10 of 12
11
Question

A root CA should always be kept online. [TRUE/FALSE]

Correct
Plaintext is the message or data in its natural format and in readable form.
Hardware-based encryption uses a device with a processor designed specifically to authenticate users and encrypt data.
Algorithms are mathematical functions that are used in the encryption and encryption processes. They can be quite simple or extremely complex
Ciphertext is the altered form of a plaintext message so as to abe unreadble for anyone except the intended recipients.
HTTPS is a protocol that secures communication and data transfer between a user's web browser and a website.
Asymmetric cryptography is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use
SSL is a standard security technology for establishing an encrypted link between a server and a client-typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook). It is also known as TLS , which is the successor technology of SSL.

Encryption is the process and act of converting the message from its plaintext to ciphertext.
Software-based encryption refers to programs that use a computer's processing power to encrypt data.

Public key infrastructure is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates.

Decryption is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and key (cryptovariable) that was used to do the original encryption
Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.


Which of the following hides the existence of information?
Correct
Cryptography can prevent an individual from fraudulently reneging on an action. What is this known as?
Correct


Brielle is researching substitution ciphers. She came across a cipher in which the entire alphabet was rotated 13 steps. What type of cipher is this?
Correct
Which of the following is FALSE about "security through obscurity"?
Correct
What is low latency?
Correct
What are public key systems that generate different random public keys for each session?
Correct
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
Correct
Which of these is NOT a basic security protection for information that cryptography can provide?
Correct


Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest?
Correct


Which of the following is NOT a symmetric cryptographic algorithm?
Correct


Which of the following is not to be decrypted but is only used for comparison purposes?
Correct
Which of these is NOT a characteristic of a secure hash algorithm?
Correct



Deo has been asked to explain RSA to his colleague. After his explanation, Deo is asked what, if any, weaknesses RSA has. How would Deo respond?
Correct


Which of these is the strongest symmetric cryptographic algorithm?
Correct
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Correct
Egor wanted to use a digital signature. Which of the following benefits will the digital signature NOT provide?
Correct


Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this?
Correct


What is a collision?
Correct


Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
Correct
Which of these provides cryptographic services and is external to the device?
Correct
Which is an IPsec protocol that authenticates that packets received were sent from the source?
Correct
What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?
Correct
What entity calls in crypto modules to perform cryptographic tasks?
Correct
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
Correct
What is the name of the device protected by a digital certificate?
Correct
What is the strongest technology that would assure Alice that Bob is the sender of a message?
Correct


Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say?
Correct
Which of the following can a digital certificate NOT be used for?
Correct


Who verifies the authenticity of a CSR?
Correct
A centralized directory of digital certificates is called a(n) _____.
Correct
Elton needs his application to perform a real-time lookup of a digital certificate's status. Which technology would he use?
Correct


What is the purpose of certificate chaining?
Correct
Which of the following is NOT a means by which a newly approved root digital certificate is distributed?
Correct


Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged?
Correct
Which is the first step in a key exchange?
Correct


What is the file extension for a Cryptographic Message Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption?
Correct



Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need?
Correct
How is confidentiality achieved through IPsec?
Correct
Which refers to a situation in which keys are managed by a third party, such as a trusted CA?
Correct
Which is a protocol for securely accessing a remote computer in order to issue a command?
Correct






















































































































































































































































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh