Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Professional Certification
Security Test 3
43 Questions
|
By Lazor-beam | Updated: Dec 14, 2012
| Attempts: 400
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 43
0 %
0/100
Score
0/100
1.
Until the development of the World Wide Web and HyperText Transfer Protocol (HTTP), the Internet was primarily used for transferring files from one device to another.
TRUE
FALSE
Submit
Start Quiz
About This Quiz
Security+ Test 3
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
The RADIUS architecture allows administrators to create a centralized database of login information.
TRUE
FALSE
Submit
3.
David is notified that one of the senior employees at XYZ Corporation is taking a leave of absence for six months. What status should he set on this user’s certificate?
Revoked
Suspended
Expired
Destroyed
Submit
4.
____ is a numbered set of PKI standards defined by the RSA Corporation
Key escrow
Public Key Cryptography Standards
Registration Authority
Trust models
Submit
5.
A _____ key is used in public key cryptography.
Public
Private
Secret
Both a and b
Submit
6.
In the _____ trust model, the primary or root certificate authority issues and signs the certificates for CAs below it.
Hierarchical
Single-point
Third-party
Web of trust
Submit
7.
The main reason that tunneling is used today is to _____.
Allow networks based on different protocols to communicate
Provide high speed connections
Provide security
Reduce the number of protocols needed to communicate
Submit
8.
The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.
Cipher
Key
Algorithm
Hash
Submit
9.
_____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.
WEP
WTLS
WOL
WSecure
Submit
10.
____ authenticates that packets received were sent from the source identified in the header of the packet.
Authentication Header
Basic Service Set
Initialization vector
Supplicant
Submit
11.
____ is a symmetric cipher that was approved in late 2000 as a replacement for DES
AES
RSA
Blowfish
Secure Hash Algorithm
Submit
12.
The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed
802.6
802.11
802.11b
802.15
Submit
13.
PPTP is software that works with a computers network interface card (NIC) to simulate a dial-up session and can assign IP addresses as necessary.
TRUE
FALSE
Submit
14.
_____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.
X.500
DAP
DCE
LDAP
Submit
15.
_____ is the science of transforming information so that it is secure while it is being transmitted or stored.
Steganography
Cryptography
Encryption
Ciphering
Submit
16.
_____ restricts availability to information.
Confidentiality
Integrity
Nonrepudiation
Access control
Submit
17.
Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.
FTP
HTTP
HTML
NNTP
Submit
18.
In key _____, the private key is actually split, and each half is encrypted.
Expiration
Recovery
Escrow
Renewal
Submit
19.
IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.
Tunnel
Secure
Transport
Standard
Submit
20.
Server certificates can be issued from a _____ server to ensure a secure transmission.
Web
FTP
Mail
All of the above
Submit
21.
Symmetric encryption is also called _____ key cryptography.
Private
Public
Unique
Session
Submit
22.
If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?
1
5
10
20
Submit
23.
____ is the process of managing keys by a third-party entity
Key escrow
Public Key Cryptography Standards
Registration Authority
Trust models
Submit
24.
When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.
Confidentiality
Authentication
Integrity
Access control
Submit
25.
The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.
1280
1536
2080
3624
Submit
26.
____ is an asymmetric algorithm published in 1977 and patented by MIT in 1983
AES
RSA
Blowfish
Secure Hash Algorithm
Submit
27.
When using digital signatures, what key does the receiver use to decrypt the digital signature?
The sender’s private key
The sender’s public key
The receiver’s private key
The receiver’s public key
Submit
28.
____ is a wireless LAN that uses a single access point to send signals to other wireless devices or to devices on the wired network
Authentication Header
Basic Service Set
Initialization vector
Supplicant
Submit
29.
George works for an ISP and needs to configure an NAS to support PPTP. What port does he need to open tunneling to function properly?
423
1024
1701
1723
Submit
30.
How many key sizes does RC6 have?
1
2
3
4
Submit
31.
___ is a hash algorithm that creates a hash value 160 bits in length instead of 128 bits
AES
RSA
Blowfish
Secure Hash Algorithm
Submit
32.
EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.
User
Folder
Volume
File
Submit
33.
____ is a 24-bit value used in wired equivalent privacy encryption
Authentication Header
Basic Service Set
Initialization vector
Supplicant
Submit
34.
What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?
EFS.exe
Cipher.exe
Crypto.exe
Secure.exe
Submit
35.
The _____ asymmetric algorithm is slower than all other algorithms.
RSA
Diffie-Hellman
Elliptic curve cryptography
DES
Submit
36.
Garret wants to check the certificate status for users on his network. Where should he access this information?
Certificate Directory
Restricted Certificate List
Certificate Repository
Certificate Revocation List
Submit
37.
Alice is concerned that her company’s employees are being victimized by man-in-the-middle attacks. What should she implement on the network to ensure that this won’t happen?
Digital signatures
Asymmetric cryptography
Digital certificates
Symmetric cryptography
Submit
38.
_______ is a client device in an IEEE 802.1x network that requires secure network access
Authentication Header
Basic Service Set
Initialization vector
Supplicant
Submit
39.
A _____ is an encrypted hash of a message that is transmitted along with the message.
Message digest
Digital signature
Cipher
Hash algorithm
Submit
40.
DES encrypts 64-bit plaintext by executing the algorithm _____ times.
4
8
12
16
Submit
41.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.
Transport
Session
Application
Network
Submit
42.
Currently, PKCS is composed of _____ standards
10
12
14
15
Submit
43.
A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.
Broadcasting
Relaying
Beaconing
Flooding
Submit
View My Results
Related Quizzes
WSET (Wine & Spirit Education Test) Level 2 Practice Test
WSET (Wine & Spirit Education Test) Level 2 Practice Test
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
BCBA Exam Questions
BCBA Exam Questions
The Ultimate IAHCSMM Quiz: Questions & Answers
The Ultimate IAHCSMM Quiz: Questions & Answers
NSDC Certification Test
NSDC Certification Test
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (43)
Unanswered (
)
Answered (
)
Until the development of the World Wide Web and HyperText Transfer...
The RADIUS architecture allows administrators to create a centralized...
David is notified that one of the senior employees at XYZ Corporation...
____ is a numbered set of PKI standards defined by the RSA...
A _____ key is used in public key cryptography.
In the _____ trust model, the primary or root certificate authority...
The main reason that tunneling is used today is to _____.
The process of encrypting and decrypting information is based on a...
_____ is an optional configuration for WLANs that encrypts packets...
____ authenticates that packets received were sent from the source...
____ is a symmetric cipher that was approved in late 2000 as a...
The _____ standard defines a LAN that provides cable-free data access...
PPTP is software that works with a computers network interface card...
...
_____ is the science of transforming information so that it is secure...
_____ restricts availability to information.
Until the development of the World Wide Web and _____ the Internet was...
In key _____, the private key is actually split, and each half is...
IPSec _____ mode encrypts only the data portion (payload) of each...
Server certificates can be issued from a _____ server to ensure a...
Symmetric encryption is also called _____ key cryptography.
If Bob is using symmetric key encryption and wants to securely...
____ is the process of managing keys by a third-party entity
When only trusted users are provided with a cipher and a key to...
The maximum length of a key in most versions of asymmetric algorithms...
____ is an asymmetric algorithm published in 1977 and patented by MIT...
When using digital signatures, what key does the receiver use to...
____ is a wireless LAN that uses a single access point...
George works for an ISP and needs to configure an NAS to support...
How many key sizes does RC6 have?
___ is a hash algorithm that creates a hash value 160 bits in length...
EFS uses asymmetric cryptography and a per-_____ encryption key to...
____ is a 24-bit value used in wired equivalent privacy encryption
What is the name of the Windows 2003 Server command liine utility that...
The _____ asymmetric algorithm is slower than all other algorithms.
Garret wants to check the certificate status for users on his...
Alice is concerned that her company’s employees are being victimized...
_______ is a client device in an IEEE 802.1x network that...
A _____ is an encrypted hash of a message that is transmitted along...
DES encrypts 64-bit plaintext by executing the algorithm _____ times.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at...
Currently, PKCS is composed of _____ standards
A security vulnerability of SSID _____ is that it also provides the...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement