We have sent an email with your new password.


Prog-350 Review Questions Chapters 9-11

60 Questions  I  By MrsQ
  • Share This on Twitter
  • +
PROG-350 Review Questions Chapters 9-11

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  _____ uses lattice-based cryptography and may be more resistant to quantum computing attacks.
A.
B.
C.
D.
2.  Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
A.
B.
C.
D.
3.  Which of the following attacks on passwords requires the attacker to have physical access to the computer to insert a USB flash drive?
A.
B.
C.
D.
4.  A(n) _____ is a set of permissions that is attached to an object.
A.
B.
C.
D.
5.  A digital signature can provide each of the following benefits except ______.
A.
B.
C.
D.
6.  Which of the following asymmetric encryption algorithms uses prime numbers?
A.
B.
C.
D.
7.  The individual who periodically reviews security settings and maintains records of access by users is called the _____.
A.
B.
C.
D.
8.  Why should the account lockout threshold not be set too low?
A.
B.
C.
D.
9.  Proving that a user sent an e-mail message is known as ______.
A.
B.
C.
D.
10.  The principle known as _____ in access control means that each user should only be given the minimal amount of privileges necessary for that person to perform their job function.
A.
B.
C.
D.
11.  Symmetric cryptographic algorithms are also called ______.
A.
B.
C.
D.
12.  Which of the following is the strongest symmetric cryptographic algorithm?
A.
B.
C.
D.
13.  Each of the following make up the AAA elements in network security except _______.
A.
B.
C.
D.
14.  What is data called that is to be encrypted by inputting into an encryption algorithm?
A.
B.
C.
D.
15.  Which of the following is not a reason why users create weak passwords?
A.
B.
C.
D.
16.  A(n) _____ is not decrypted but is only used for comparison purposes.
A.
B.
C.
D.
17.  A process functioning on behalf of the user that attempts to access a file is known as a(n) _______.
A.
B.
C.
D.
18.  The version of the X.500 standard that runs on a personal computer over TCP/IP is_____.
A.
B.
C.
D.
19.  In the Mandatory Access Control (MAC) model, every subject and object _____.
A.
B.
C.
D.
20.  Separation of duties requires that _____.
A.
B.
C.
D.
21.  Each of the following is a type of authentication credential except _______.
A.
B.
C.
D.
22.  If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is _______.
A.
B.
C.
D.
23.  _____ is an authentication protocol available as a free download that runs on Microsoft Windows 7/Vista, Windows Server 2008, Apple Mac OS X, and Linux.
A.
B.
C.
D.
24.  A(n) _____ is the person responsible for the information and determines the level of security needed for the data and delegates security duties as required.
A.
B.
C.
D.
25.  Creating a pattern of when and from where a user accesses a remote Web account is an example of ________.
A.
B.
C.
D.
26.  _____ is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users who are using Active Directory.
A.
B.
C.
D.
27.  A RADIUS authentication server requires that the _____ be authenticated first.authentication server.
A.
B.
C.
D.
28.  Each of the following is a step in creating a strong password except _______.
A.
B.
C.
D.
29.  Using one authentication credential to access multiple accounts or applications is known as _______.
A.
B.
C.
D.
30.  _____ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
A.
B.
C.
D.
31.  Which technique would prevent an attacker from China from logging into a user’s account at 4:00AM?
A.
B.
C.
D.
32.  A user entering her user name would correspond to the _____ action in access control.
A.
B.
C.
D.
33.  _____ encrypts a hash with a shared secret key.
A.
B.
C.
D.
34.  _____ biometrics is related to the perception, thought processes, and understanding of the user.
A.
B.
C.
D.
35.  A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.
A.
B.
C.
D.
36.  Which of the following is NOT a flaw in standard operating systems?
A.
B.
C.
D.
37.  Keystroke dynamics is an example of _____ biometrics.
A.
B.
C.
D.
38.  Which of the following asymmetric cryptographic algorithms is the most secure?
A.
B.
C.
D.
39.  A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.
A.
B.
C.
D.
40.  A token system that requires the user to enter the code along with a PIN is called a _______.
A.
B.
C.
D.
41.  In the _____ model, the end user cannot change any security settings.
A.
B.
C.
D.
42.  Which of the following is a protection provided by hashing?
A.
B.
C.
D.
43.  A disadvantage of biometric readers is _______.
A.
B.
C.
D.
44.  A _____ is a U.S. Department of Defense (DoD) smart card that is used for identification for active-duty and reserve military personnel.
A.
B.
C.
D.
45.  Which of the following is not a basic security protection over information that cryptography can provide?
A.
B.
C.
D.
46.  What is a hybrid attack?
A.
B.
C.
D.
47.  A token code is valid _______.
A.
B.
C.
D.
48.  With the development of IEEE 802.1x port security, the authentication server _____ has seen even greater usage.
A.
B.
C.
D.
49.  The least restrictive access control model is _____.
A.
B.
C.
D.
50.  _____ is a hash that uses two different and independent parallel chains of computation, the result of which are then combined at the end of the process.
A.
B.
C.
D.
51.  The Microsoft Windows LAN Manager hash ______.
A.
B.
C.
D.
52.  The Trusted Platform Module (TPM) _____.
A.
B.
C.
D.
53.  The areas of a file in which steganography can hide data include all of the following except ______.
A.
B.
C.
D.
54.  Rule Based Access Control _____.
A.
B.
C.
D.
55.  Hashing would not be used in which of the following examples?
A.
B.
C.
D.
56.  Which of the following human characteristics cannot be used for biometric identification?
A.
B.
C.
D.
57.  Each of the following is a characteristic of a secure hash algorithm except _______.
A.
B.
C.
D.
58.  An operating system that is designed to be secure by controlling critical parts of it to limit access from attackers and administrators is a _______.
A.
B.
C.
D.
59.  _____ in access control means that if a condition is not explicitly met then access is to be rejected.
A.
B.
C.
D.
60.  Which single sign-on (SSO) technology depends upon tokens?
A.
B.
C.
D.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz