Zzz 11-14
Confidentiality
Stop loss
Integrity
Authenticity
Rate this question:
In data that is used to describe the content or structure of the actual data
In the directory structure of the file system
In the file header fields that describe the file
In areas that contain the content data itself
Rate this question:
Repudiation
Integrity
Nonrepudiation
Availability
Rate this question:
Private key cryptography
Cipherkey cryptography
Public/private key cryptography
Public key cryptography
Rate this question:
Stream
Hash
Algorithm
Key
Rate this question:
Encryption
Access control
Data masking
Data obscurity
Rate this question:
Bank automatic teller machine (ATM)
Encrypting and decrypting email attachments
Verifying a user password entered on a Linux system
Determining the integrity of a message
Rate this question:
Key_hash
WEP
MDRIPE
Hashed Message Authentication Code (HMAC)
Rate this question:
Authenticity
Confidentiality
Integrity
Availability
Rate this question:
DES
AES
RC4
RIPEMD
Rate this question:
Advanced Encryption Standard
Data Encryption Standard
Triple Data Encryption Standard
Rivest Cipher (RC) 1
Rate this question:
Alice’s private key
Alice’s public key
Bob’s public key
Bob’s private key
Rate this question:
Prove the integrity of the message
Verify the receiver
Verify the sender
Enforce nonrepudiation
Rate this question:
MEC-2
RSA
MD-17
SHA-2
Rate this question:
EFS
Quantum computing
ECC
RSA
Rate this question:
NTRUEncrypt
ECC
RC4
SHA-512
Rate this question:
Allows the user to boot a corrupted disk and repair it
Is only available on Windows computers running BitLocker
Includes a pseudorandom number generator (PRNG)
Provides cryptographic services in hardware instead of software
Rate this question:
Trusted Platform Module (TPM)
Self-encrypting hard disk drives (HDDs)
Encrypted hardware-based USB devices
Hardware Security Module (HSM)
Rate this question:
Is weaker than NTLMv2
Is part of BitLocker
Is required to be present when using TPM
Is identical to MD-4
Rate this question:
Digital signature
Encrypted signature
Hash
Digital certificate
Rate this question:
A private key with a digital signature
the user’s identity with their public key
A user’s private key with public key
A user’s public key with their private key
Rate this question:
To verify the authenticity of the Registration Authorizer
To verify the identity of clients and servers on the Web
To encrypt messages for secure email communications
To encrypt channels to provide secure communications between clients and servers
Rate this question:
Certificate Signatory (CS)
Signature Authority (SA)
Digital Signer (DS)
Certificate Authority (CA)
Rate this question:
Digital Signature Approval List (DSAP)
Digital Signature Permitted Authorization (DSPA)
Authorized Digital Signature (ADS)
Certificate Repository (CR)
Rate this question:
Validity period
CA expiration code
Serial number
Signature
Rate this question:
Email Web certificate
Server digital certificate
Personal digital certificate
Web digital certificate
Rate this question:
X.509 Certificate
Advanced Web Server Certificate (AWSC)
Extended Validation SSL Certificate
Personal Web-Client Certificate
Rate this question:
First
Second
Third
Fourth
Rate this question:
Are used to create public keys only
Define how hashing algorithms are created
Have been replaced by PKI
Are widely accepted in the industry
Rate this question:
It assigns a signal hierarchy with one master CA
It is designed for use on a large scale
The master CA is called the root
The root signs all digital certificate authorities with a single key
Rate this question:
Are used in military and financial settings when it is necessary for the client to authenticate back to the server
Are the same as dual-key digital certificates
Are required under PKCS #1
Require a special browser
Rate this question:
In hashes
On the user’s local system
Embedded in digital certificates
In tokens
Rate this question:
Creates private key cryptography
Requires the use of an RA instead of a CA
Generates public/private keys automatically
Is the management of digital certificates
Rate this question:
Certificate policy (CP)
Certificate practice statement (CPS)
Signature resource guide (SRG)
Enforcement certificate (EF)
Rate this question:
Authorization
Creation
Expiration
Revocation
Rate this question:
Remote key administration
Trusted key authority
Key authorization
Key escrow
Rate this question:
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Secure Hypertext Transport Protocol (SHTTP)
Transport layer Security (TLS)
Rate this question:
SHTTP
PPPTPoE
HTTPS
MD-17
Rate this question:
IPsec
SSH
SSL/TLS
RSA
Rate this question:
Quiz Review Timeline (Updated): Jan 6, 2025 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.