Security Test 3

43 Questions | Attempts: 400
Share

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Security+ Test 3


Questions and Answers
  • 1. 

    Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.

    • A.

      FTP

    • B.

      HTTP

    • C.

      HTML

    • D.

      NNTP

    Correct Answer
    B. HTTP
  • 2. 

    The main reason that tunneling is used today is to _____.

    • A.

      Allow networks based on different protocols to communicate

    • B.

      Provide high speed connections

    • C.

      Provide security

    • D.

      Reduce the number of protocols needed to communicate

    Correct Answer
    C. Provide security
  • 3. 

    George works for an ISP and needs to configure an NAS to support PPTP.  What port does he need to open tunneling to function properly?

    • A.

      423

    • B.

      1024

    • C.

      1701

    • D.

      1723

    Correct Answer
    D. 1723
  • 4. 

    Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.

    • A.

      Transport

    • B.

      Session

    • C.

      Application

    • D.

      Network

    Correct Answer
    B. Session
  • 5. 

    IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.

    • A.

      Tunnel

    • B.

      Secure

    • C.

      Transport

    • D.

      Standard

    Correct Answer
    C. Transport
  • 6. 

                _____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.

    • A.

      X.500

    • B.

      DAP

    • C.

      DCE

    • D.

      LDAP

    Correct Answer
    D. LDAP
  • 7. 

    The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed

    • A.

      802.6

    • B.

      802.11

    • C.

      802.11b

    • D.

      802.15

    Correct Answer
    B. 802.11
  • 8. 

    A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.

    • A.

      Broadcasting

    • B.

      Relaying

    • C.

      Beaconing

    • D.

      Flooding

    Correct Answer
    C. Beaconing
  • 9. 

    _____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.

    • A.

      WEP

    • B.

      WTLS

    • C.

      WOL

    • D.

      WSecure

    Correct Answer
    A. WEP
  • 10. 

    _____ is the science of transforming information so that it is secure while it is being transmitted or stored.

    • A.

      Steganography

    • B.

      Cryptography

    • C.

      Encryption

    • D.

      Ciphering

    Correct Answer
    B. Cryptography
  • 11. 

    The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.

    • A.

      Cipher

    • B.

      Key

    • C.

      Algorithm

    • D.

      Hash

    Correct Answer
    C. Algorithm
  • 12. 

    When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.

    • A.

      Confidentiality

    • B.

      Authentication

    • C.

      Integrity

    • D.

      Access control

    Correct Answer
    A. Confidentiality
  • 13. 

    _____ restricts availability to information.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Nonrepudiation

    • D.

      Access control

    Correct Answer
    D. Access control
  • 14. 

    Symmetric encryption is also called _____ key cryptography.

    • A.

      Private

    • B.

      Public

    • C.

      Unique

    • D.

      Session

    Correct Answer
    A. Private
  • 15. 

    DES encrypts 64-bit plaintext by executing the algorithm _____ times.

    • A.

      4

    • B.

      8

    • C.

      12

    • D.

      16

    Correct Answer
    D. 16
  • 16. 

    How many key sizes does RC6 have?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    C. 3
  • 17. 

    A _____ key is used in public key cryptography.

    • A.

      Public

    • B.

      Private

    • C.

      Secret

    • D.

      Both a and b

    Correct Answer
    D. Both a and b
  • 18. 

    The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.

    • A.

      1280

    • B.

      1536

    • C.

      2080

    • D.

      3624

    Correct Answer
    C. 2080
  • 19. 

    The _____ asymmetric algorithm is slower than all other algorithms.

    • A.

      RSA

    • B.

      Diffie-Hellman

    • C.

      Elliptic curve cryptography

    • D.

      DES

    Correct Answer
    A. RSA
  • 20. 

    A _____ is an encrypted hash of a message that is transmitted along with the message.

    • A.

      Message digest

    • B.

      Digital signature

    • C.

      Cipher

    • D.

      Hash algorithm

    Correct Answer
    B. Digital signature
  • 21. 

    EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.

    • A.

      User

    • B.

      Folder

    • C.

      Volume

    • D.

      File

    Correct Answer
    D. File
  • 22. 

    What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?

    • A.

      EFS.exe

    • B.

      Cipher.exe

    • C.

      Crypto.exe

    • D.

      Secure.exe

    Correct Answer
    B. Cipher.exe
  • 23. 

    If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?

    • A.

      1

    • B.

      5

    • C.

      10

    • D.

      20

    Correct Answer
    D. 20
  • 24. 

    When using digital signatures, what key does the receiver use to decrypt the digital signature?

    • A.

      The sender’s private key

    • B.

      The sender’s public key

    • C.

      The receiver’s private key

    • D.

      The receiver’s public key

    Correct Answer
    B. The sender’s public key
  • 25. 

    Garret wants to check the certificate status for users on his network.  Where should he access this information?

    • A.

      Certificate Directory

    • B.

      Restricted Certificate List

    • C.

      Certificate Repository

    • D.

      Certificate Revocation List

    Correct Answer
    C. Certificate Repository
  • 26. 

    Alice is concerned that her company’s employees are being victimized by man-in-the-middle attacks.  What should she implement on the network to ensure that this won’t happen?

    • A.

      Digital signatures

    • B.

      Asymmetric cryptography

    • C.

      Digital certificates

    • D.

      Symmetric cryptography

    Correct Answer
    C. Digital certificates
  • 27. 

    Currently, PKCS is composed of _____ standards

    • A.

      10

    • B.

      12

    • C.

      14

    • D.

      15

    Correct Answer
    D. 15
  • 28. 

    In the _____ trust model, the primary or root certificate authority issues and signs the certificates for CAs below it.

    • A.

      Hierarchical

    • B.

      Single-point

    • C.

      Third-party

    • D.

      Web of trust

    Correct Answer
    A. Hierarchical
  • 29. 

    David is notified that one of the senior employees at XYZ Corporation is taking a leave of absence for six months. What status should he set on this user’s certificate?

    • A.

      Revoked

    • B.

      Suspended

    • C.

      Expired

    • D.

      Destroyed

    Correct Answer
    B. Suspended
  • 30. 

    In key _____, the private key is actually split, and each half is encrypted.

    • A.

      Expiration

    • B.

      Recovery

    • C.

      Escrow

    • D.

      Renewal

    Correct Answer
    C. Escrow
  • 31. 

    Server certificates can be issued from a _____ server to ensure a secure transmission.

    • A.

      Web

    • B.

      FTP

    • C.

      Mail

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 32. 

    _______ is a client device in an IEEE 802.1x network that requires secure network access

    • A.

      Authentication Header

    • B.

      Basic Service Set

    • C.

      Initialization vector

    • D.

      Supplicant

    Correct Answer
    D. Supplicant
  • 33. 

    ____ is a wireless LAN that uses a single access point to send signals to other wireless devices or to devices on the wired network

    • A.

      Authentication Header

    • B.

      Basic Service Set

    • C.

      Initialization vector

    • D.

      Supplicant

    Correct Answer
    B. Basic Service Set
  • 34. 

    ____ is a 24-bit value used in wired equivalent privacy encryption

    • A.

      Authentication Header

    • B.

      Basic Service Set

    • C.

      Initialization vector

    • D.

      Supplicant

    Correct Answer
    C. Initialization vector
  • 35. 

    ____ authenticates that packets received were sent from the source identified in the header of the packet.

    • A.

      Authentication Header

    • B.

      Basic Service Set

    • C.

      Initialization vector

    • D.

      Supplicant

    Correct Answer
    A. Authentication Header
  • 36. 

    ___ is a hash algorithm that creates a hash value 160 bits in length instead of 128 bits

    • A.

      AES

    • B.

      RSA

    • C.

      Blowfish

    • D.

      Secure Hash Algorithm

    Correct Answer
    D. Secure Hash Algorithm
  • 37. 

    ____ is an asymmetric algorithm published in 1977 and patented by MIT in 1983

    • A.

      AES

    • B.

      RSA

    • C.

      Blowfish

    • D.

      Secure Hash Algorithm

    Correct Answer
    B. RSA
  • 38. 

    ____ is a symmetric cipher that was approved in late 2000 as a replacement for DES

    • A.

      AES

    • B.

      RSA

    • C.

      Blowfish

    • D.

      Secure Hash Algorithm

    Correct Answer
    A. AES
  • 39. 

    ____ is the process of managing keys by a third-party entity

    • A.

      Key escrow

    • B.

      Public Key Cryptography Standards

    • C.

      Registration Authority

    • D.

      Trust models

    Correct Answer
    A. Key escrow
  • 40. 

    ____ is a numbered set of PKI standards defined by the RSA Corporation

    • A.

      Key escrow

    • B.

      Public Key Cryptography Standards

    • C.

      Registration Authority

    • D.

      Trust models

    Correct Answer
    B. Public Key Cryptography Standards
  • 41. 

    Until the development of the World Wide Web and HyperText Transfer Protocol (HTTP), the Internet was primarily used for transferring files from one device to another.

    • A.

      TRUE

    • B.

      FALSE

    Correct Answer
    A. TRUE
  • 42. 

    PPTP is software that works with a computers network interface card (NIC) to simulate a dial-up session and can assign IP addresses as necessary.

    • A.

      TRUE

    • B.

      FALSE

    Correct Answer
    B. FALSE
  • 43. 

    The RADIUS architecture allows administrators to create a centralized database of login information.

    • A.

      TRUE

    • B.

      FALSE

    Correct Answer
    A. TRUE

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 14, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 16, 2008
    Quiz Created by
    Lazor-beam
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.