Security Test 3

43 Questions | Attempts: 400
Please wait...
Question 1 / 44
🏆 Rank #--
Score 0/100

1. Until the development of the World Wide Web and HyperText Transfer Protocol (HTTP), the Internet was primarily used for transferring files from one device to another.

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

Security+ Test 3

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. The RADIUS architecture allows administrators to create a centralized database of login information.

Submit

3. David is notified that one of the senior employees at XYZ Corporation is taking a leave of absence for six months. What status should he set on this user’s certificate?

Submit

4. ____ is a numbered set of PKI standards defined by the RSA Corporation

Submit

5. A _____ key is used in public key cryptography.

Submit

6. In the _____ trust model, the primary or root certificate authority issues and signs the certificates for CAs below it.

Submit

7. The main reason that tunneling is used today is to _____.

Submit

8. The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.

Submit

9. _____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.

Submit

10. ____ authenticates that packets received were sent from the source identified in the header of the packet.

Submit

11. ____ is a symmetric cipher that was approved in late 2000 as a replacement for DES

Submit

12. The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed

Submit

13. PPTP is software that works with a computers network interface card (NIC) to simulate a dial-up session and can assign IP addresses as necessary.

Submit

14.             _____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.

Submit

15. _____ is the science of transforming information so that it is secure while it is being transmitted or stored.

Submit

16. _____ restricts availability to information.

Submit

17. Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.

Submit

18. In key _____, the private key is actually split, and each half is encrypted.

Submit

19. IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.

Submit

20. Server certificates can be issued from a _____ server to ensure a secure transmission.

Submit

21. Symmetric encryption is also called _____ key cryptography.

Submit

22. If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?

Submit

23. ____ is the process of managing keys by a third-party entity

Submit

24. When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.

Submit

25. The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.

Submit

26. ____ is an asymmetric algorithm published in 1977 and patented by MIT in 1983

Submit

27. When using digital signatures, what key does the receiver use to decrypt the digital signature?

Submit

28. ____ is a wireless LAN that uses a single access point to send signals to other wireless devices or to devices on the wired network

Submit

29. George works for an ISP and needs to configure an NAS to support PPTP.  What port does he need to open tunneling to function properly?

Submit

30. How many key sizes does RC6 have?

Submit

31. ___ is a hash algorithm that creates a hash value 160 bits in length instead of 128 bits

Submit

32. EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.

Submit

33. ____ is a 24-bit value used in wired equivalent privacy encryption

Submit

34. What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?

Submit

35. The _____ asymmetric algorithm is slower than all other algorithms.

Submit

36. Garret wants to check the certificate status for users on his network.  Where should he access this information?

Submit

37. Alice is concerned that her company’s employees are being victimized by man-in-the-middle attacks.  What should she implement on the network to ensure that this won’t happen?

Submit

38. _______ is a client device in an IEEE 802.1x network that requires secure network access

Submit

39. A _____ is an encrypted hash of a message that is transmitted along with the message.

Submit

40. DES encrypts 64-bit plaintext by executing the algorithm _____ times.

Submit

41. Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.

Submit

42. Currently, PKCS is composed of _____ standards

Submit

43. A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (43)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Until the development of the World Wide Web and HyperText Transfer...
The RADIUS architecture allows administrators to create a centralized...
David is notified that one of the senior employees at XYZ Corporation...
____ is a numbered set of PKI standards defined by the RSA...
A _____ key is used in public key cryptography.
In the _____ trust model, the primary or root certificate authority...
The main reason that tunneling is used today is to _____.
The process of encrypting and decrypting information is based on a...
_____ is an optional configuration for WLANs that encrypts packets...
____ authenticates that packets received were sent from the source...
____ is a symmetric cipher that was approved in late 2000 as a...
The _____ standard defines a LAN that provides cable-free data access...
PPTP is software that works with a computers network interface card...
           ...
_____ is the science of transforming information so that it is secure...
_____ restricts availability to information.
Until the development of the World Wide Web and _____ the Internet was...
In key _____, the private key is actually split, and each half is...
IPSec _____ mode encrypts only the data portion (payload) of each...
Server certificates can be issued from a _____ server to ensure a...
Symmetric encryption is also called _____ key cryptography.
If Bob is using symmetric key encryption and wants to securely...
____ is the process of managing keys by a third-party entity
When only trusted users are provided with a cipher and a key to...
The maximum length of a key in most versions of asymmetric algorithms...
____ is an asymmetric algorithm published in 1977 and patented by MIT...
When using digital signatures, what key does the receiver use to...
____ is a wireless LAN that uses a single access point...
George works for an ISP and needs to configure an NAS to support...
How many key sizes does RC6 have?
___ is a hash algorithm that creates a hash value 160 bits in length...
EFS uses asymmetric cryptography and a per-_____ encryption key to...
____ is a 24-bit value used in wired equivalent privacy encryption
What is the name of the Windows 2003 Server command liine utility that...
The _____ asymmetric algorithm is slower than all other algorithms.
Garret wants to check the certificate status for users on his...
Alice is concerned that her company’s employees are being victimized...
_______ is a client device in an IEEE 802.1x network that...
A _____ is an encrypted hash of a message that is transmitted along...
DES encrypts 64-bit plaintext by executing the algorithm _____ times.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at...
Currently, PKCS is composed of _____ standards
A security vulnerability of SSID _____ is that it also provides the...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!