Security Test 3

43 Questions | Attempts: 400
Share
Please wait...
Question 1 / 43
0 %
0/100
Score 0/100
1. Until the development of the World Wide Web and HyperText Transfer Protocol (HTTP), the Internet was primarily used for transferring files from one device to another.
Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

Security+ Test 3

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. The RADIUS architecture allows administrators to create a centralized database of login information.
Submit
3. David is notified that one of the senior employees at XYZ Corporation is taking a leave of absence for six months. What status should he set on this user’s certificate?
Submit
4. ____ is a numbered set of PKI standards defined by the RSA Corporation
Submit
5. A _____ key is used in public key cryptography.
Submit
6. In the _____ trust model, the primary or root certificate authority issues and signs the certificates for CAs below it.
Submit
7. The main reason that tunneling is used today is to _____.
Submit
8. The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.
Submit
9. _____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.
Submit
10. ____ authenticates that packets received were sent from the source identified in the header of the packet.
Submit
11. ____ is a symmetric cipher that was approved in late 2000 as a replacement for DES
Submit
12. The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed
Submit
13. PPTP is software that works with a computers network interface card (NIC) to simulate a dial-up session and can assign IP addresses as necessary.
Submit
14.             _____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.
Submit
15. _____ is the science of transforming information so that it is secure while it is being transmitted or stored.
Submit
16. _____ restricts availability to information.
Submit
17. Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.
Submit
18. In key _____, the private key is actually split, and each half is encrypted.
Submit
19. IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.
Submit
20. Server certificates can be issued from a _____ server to ensure a secure transmission.
Submit
21. Symmetric encryption is also called _____ key cryptography.
Submit
22. If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?
Submit
23. ____ is the process of managing keys by a third-party entity
Submit
24. When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.
Submit
25. The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.
Submit
26. ____ is an asymmetric algorithm published in 1977 and patented by MIT in 1983
Submit
27. When using digital signatures, what key does the receiver use to decrypt the digital signature?
Submit
28. ____ is a wireless LAN that uses a single access point to send signals to other wireless devices or to devices on the wired network
Submit
29. George works for an ISP and needs to configure an NAS to support PPTP.  What port does he need to open tunneling to function properly?
Submit
30. How many key sizes does RC6 have?
Submit
31. ___ is a hash algorithm that creates a hash value 160 bits in length instead of 128 bits
Submit
32. EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.
Submit
33. ____ is a 24-bit value used in wired equivalent privacy encryption
Submit
34. What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?
Submit
35. The _____ asymmetric algorithm is slower than all other algorithms.
Submit
36. Garret wants to check the certificate status for users on his network.  Where should he access this information?
Submit
37. Alice is concerned that her company’s employees are being victimized by man-in-the-middle attacks.  What should she implement on the network to ensure that this won’t happen?
Submit
38. _______ is a client device in an IEEE 802.1x network that requires secure network access
Submit
39. A _____ is an encrypted hash of a message that is transmitted along with the message.
Submit
40. DES encrypts 64-bit plaintext by executing the algorithm _____ times.
Submit
41. Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.
Submit
42. Currently, PKCS is composed of _____ standards
Submit
43. A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.
Submit
View My Results

Quiz Review Timeline (Updated): Dec 14, 2012 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 14, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 16, 2008
    Quiz Created by
    Lazor-beam
Cancel
  • All
    All (43)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Until the development of the World Wide Web and HyperText Transfer...
The RADIUS architecture allows administrators to create a centralized...
David is notified that one of the senior employees at XYZ Corporation...
____ is a numbered set of PKI standards defined by the RSA...
A _____ key is used in public key cryptography.
In the _____ trust model, the primary or root certificate authority...
The main reason that tunneling is used today is to _____.
The process of encrypting and decrypting information is based on a...
_____ is an optional configuration for WLANs that encrypts packets...
____ authenticates that packets received were sent from the source...
____ is a symmetric cipher that was approved in late 2000 as a...
The _____ standard defines a LAN that provides cable-free data access...
PPTP is software that works with a computers network interface card...
           ...
_____ is the science of transforming information so that it is secure...
_____ restricts availability to information.
Until the development of the World Wide Web and _____ the Internet was...
In key _____, the private key is actually split, and each half is...
IPSec _____ mode encrypts only the data portion (payload) of each...
Server certificates can be issued from a _____ server to ensure a...
Symmetric encryption is also called _____ key cryptography.
If Bob is using symmetric key encryption and wants to securely...
____ is the process of managing keys by a third-party entity
When only trusted users are provided with a cipher and a key to...
The maximum length of a key in most versions of asymmetric algorithms...
____ is an asymmetric algorithm published in 1977 and patented by MIT...
When using digital signatures, what key does the receiver use to...
____ is a wireless LAN that uses a single access point...
George works for an ISP and needs to configure an NAS to support...
How many key sizes does RC6 have?
___ is a hash algorithm that creates a hash value 160 bits in length...
EFS uses asymmetric cryptography and a per-_____ encryption key to...
____ is a 24-bit value used in wired equivalent privacy encryption
What is the name of the Windows 2003 Server command liine utility that...
The _____ asymmetric algorithm is slower than all other algorithms.
Garret wants to check the certificate status for users on his...
Alice is concerned that her company’s employees are being victimized...
_______ is a client device in an IEEE 802.1x network that...
A _____ is an encrypted hash of a message that is transmitted along...
DES encrypts 64-bit plaintext by executing the algorithm _____ times.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at...
Currently, PKCS is composed of _____ standards
A security vulnerability of SSID _____ is that it also provides the...
Alert!

Advertisement