Security Test 3

43 Questions | Attempts: 400
Share
SettingsSettings
Please wait...
  • 1/43 Questions

    Until the development of the World Wide Web and HyperText Transfer Protocol (HTTP), the Internet was primarily used for transferring files from one device to another.

    • TRUE
    • FALSE
Please wait...
About This Quiz

Security+ Test 3

Security Plus Quizzes & Trivia

Quiz Preview

  • 2. 

    The RADIUS architecture allows administrators to create a centralized database of login information.

    • TRUE

    • FALSE

    Correct Answer
    A. TRUE
  • 3. 

    David is notified that one of the senior employees at XYZ Corporation is taking a leave of absence for six months. What status should he set on this user’s certificate?

    • Revoked

    • Suspended

    • Expired

    • Destroyed

    Correct Answer
    A. Suspended
  • 4. 

    ____ is a numbered set of PKI standards defined by the RSA Corporation

    • Key escrow

    • Public Key Cryptography Standards

    • Registration Authority

    • Trust models

    Correct Answer
    A. Public Key Cryptography Standards
  • 5. 

    A _____ key is used in public key cryptography.

    • Public

    • Private

    • Secret

    • Both a and b

    Correct Answer
    A. Both a and b
  • 6. 

    In the _____ trust model, the primary or root certificate authority issues and signs the certificates for CAs below it.

    • Hierarchical

    • Single-point

    • Third-party

    • Web of trust

    Correct Answer
    A. Hierarchical
  • 7. 

    The main reason that tunneling is used today is to _____.

    • Allow networks based on different protocols to communicate

    • Provide high speed connections

    • Provide security

    • Reduce the number of protocols needed to communicate

    Correct Answer
    A. Provide security
  • 8. 

    The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.

    • Cipher

    • Key

    • Algorithm

    • Hash

    Correct Answer
    A. Algorithm
  • 9. 

    _____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.

    • WEP

    • WTLS

    • WOL

    • WSecure

    Correct Answer
    A. WEP
  • 10. 

    ____ authenticates that packets received were sent from the source identified in the header of the packet.

    • Authentication Header

    • Basic Service Set

    • Initialization vector

    • Supplicant

    Correct Answer
    A. Authentication Header
  • 11. 

    ____ is a symmetric cipher that was approved in late 2000 as a replacement for DES

    • AES

    • RSA

    • Blowfish

    • Secure Hash Algorithm

    Correct Answer
    A. AES
  • 12. 

    The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed

    • 802.6

    • 802.11

    • 802.11b

    • 802.15

    Correct Answer
    A. 802.11
  • 13. 

    PPTP is software that works with a computers network interface card (NIC) to simulate a dial-up session and can assign IP addresses as necessary.

    • TRUE

    • FALSE

    Correct Answer
    A. FALSE
  • 14. 

                _____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.

    • X.500

    • DAP

    • DCE

    • LDAP

    Correct Answer
    A. LDAP
  • 15. 

    _____ is the science of transforming information so that it is secure while it is being transmitted or stored.

    • Steganography

    • Cryptography

    • Encryption

    • Ciphering

    Correct Answer
    A. Cryptography
  • 16. 

    _____ restricts availability to information.

    • Confidentiality

    • Integrity

    • Nonrepudiation

    • Access control

    Correct Answer
    A. Access control
  • 17. 

    Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.

    • FTP

    • HTTP

    • HTML

    • NNTP

    Correct Answer
    A. HTTP
  • 18. 

    In key _____, the private key is actually split, and each half is encrypted.

    • Expiration

    • Recovery

    • Escrow

    • Renewal

    Correct Answer
    A. Escrow
  • 19. 

    IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.

    • Tunnel

    • Secure

    • Transport

    • Standard

    Correct Answer
    A. Transport
  • 20. 

    Server certificates can be issued from a _____ server to ensure a secure transmission.

    • Web

    • FTP

    • Mail

    • All of the above

    Correct Answer
    A. All of the above
  • 21. 

    Symmetric encryption is also called _____ key cryptography.

    • Private

    • Public

    • Unique

    • Session

    Correct Answer
    A. Private
  • 22. 

    If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?

    • 1

    • 5

    • 10

    • 20

    Correct Answer
    A. 20
  • 23. 

    ____ is the process of managing keys by a third-party entity

    • Key escrow

    • Public Key Cryptography Standards

    • Registration Authority

    • Trust models

    Correct Answer
    A. Key escrow
  • 24. 

    When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.

    • Confidentiality

    • Authentication

    • Integrity

    • Access control

    Correct Answer
    A. Confidentiality
  • 25. 

    The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.

    • 1280

    • 1536

    • 2080

    • 3624

    Correct Answer
    A. 2080
  • 26. 

    ____ is an asymmetric algorithm published in 1977 and patented by MIT in 1983

    • AES

    • RSA

    • Blowfish

    • Secure Hash Algorithm

    Correct Answer
    A. RSA
  • 27. 

    When using digital signatures, what key does the receiver use to decrypt the digital signature?

    • The sender’s private key

    • The sender’s public key

    • The receiver’s private key

    • The receiver’s public key

    Correct Answer
    A. The sender’s public key
  • 28. 

    ____ is a wireless LAN that uses a single access point to send signals to other wireless devices or to devices on the wired network

    • Authentication Header

    • Basic Service Set

    • Initialization vector

    • Supplicant

    Correct Answer
    A. Basic Service Set
  • 29. 

    George works for an ISP and needs to configure an NAS to support PPTP.  What port does he need to open tunneling to function properly?

    • 423

    • 1024

    • 1701

    • 1723

    Correct Answer
    A. 1723
  • 30. 

    How many key sizes does RC6 have?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 3
  • 31. 

    ___ is a hash algorithm that creates a hash value 160 bits in length instead of 128 bits

    • AES

    • RSA

    • Blowfish

    • Secure Hash Algorithm

    Correct Answer
    A. Secure Hash Algorithm
  • 32. 

    EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.

    • User

    • Folder

    • Volume

    • File

    Correct Answer
    A. File
  • 33. 

    ____ is a 24-bit value used in wired equivalent privacy encryption

    • Authentication Header

    • Basic Service Set

    • Initialization vector

    • Supplicant

    Correct Answer
    A. Initialization vector
  • 34. 

    What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?

    • EFS.exe

    • Cipher.exe

    • Crypto.exe

    • Secure.exe

    Correct Answer
    A. Cipher.exe
  • 35. 

    The _____ asymmetric algorithm is slower than all other algorithms.

    • RSA

    • Diffie-Hellman

    • Elliptic curve cryptography

    • DES

    Correct Answer
    A. RSA
  • 36. 

    Garret wants to check the certificate status for users on his network.  Where should he access this information?

    • Certificate Directory

    • Restricted Certificate List

    • Certificate Repository

    • Certificate Revocation List

    Correct Answer
    A. Certificate Repository
  • 37. 

    Alice is concerned that her company’s employees are being victimized by man-in-the-middle attacks.  What should she implement on the network to ensure that this won’t happen?

    • Digital signatures

    • Asymmetric cryptography

    • Digital certificates

    • Symmetric cryptography

    Correct Answer
    A. Digital certificates
  • 38. 

    _______ is a client device in an IEEE 802.1x network that requires secure network access

    • Authentication Header

    • Basic Service Set

    • Initialization vector

    • Supplicant

    Correct Answer
    A. Supplicant
  • 39. 

    A _____ is an encrypted hash of a message that is transmitted along with the message.

    • Message digest

    • Digital signature

    • Cipher

    • Hash algorithm

    Correct Answer
    A. Digital signature
  • 40. 

    DES encrypts 64-bit plaintext by executing the algorithm _____ times.

    • 4

    • 8

    • 12

    • 16

    Correct Answer
    A. 16
  • 41. 

    Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.

    • Transport

    • Session

    • Application

    • Network

    Correct Answer
    A. Session
  • 42. 

    Currently, PKCS is composed of _____ standards

    • 10

    • 12

    • 14

    • 15

    Correct Answer
    A. 15
  • 43. 

    A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.

    • Broadcasting

    • Relaying

    • Beaconing

    • Flooding

    Correct Answer
    A. Beaconing

Quiz Review Timeline (Updated): Dec 14, 2012 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 14, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 16, 2008
    Quiz Created by
    Lazor-beam
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.