Security Test 3

43 Questions | Total Attempts: 399

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Security+ Test 3


Questions and Answers
  • 1. 
    Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.
    • A. 

      FTP

    • B. 

      HTTP

    • C. 

      HTML

    • D. 

      NNTP

  • 2. 
    The main reason that tunneling is used today is to _____.
    • A. 

      Allow networks based on different protocols to communicate

    • B. 

      Provide high speed connections

    • C. 

      Provide security

    • D. 

      Reduce the number of protocols needed to communicate

  • 3. 
    George works for an ISP and needs to configure an NAS to support PPTP.  What port does he need to open tunneling to function properly?
    • A. 

      423

    • B. 

      1024

    • C. 

      1701

    • D. 

      1723

  • 4. 
    Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.
    • A. 

      Transport

    • B. 

      Session

    • C. 

      Application

    • D. 

      Network

  • 5. 
    IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.
    • A. 

      Tunnel

    • B. 

      Secure

    • C. 

      Transport

    • D. 

      Standard

  • 6. 
                _____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.
    • A. 

      X.500

    • B. 

      DAP

    • C. 

      DCE

    • D. 

      LDAP

  • 7. 
    The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed
    • A. 

      802.6

    • B. 

      802.11

    • C. 

      802.11b

    • D. 

      802.15

  • 8. 
    A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.
    • A. 

      Broadcasting

    • B. 

      Relaying

    • C. 

      Beaconing

    • D. 

      Flooding

  • 9. 
    _____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.
    • A. 

      WEP

    • B. 

      WTLS

    • C. 

      WOL

    • D. 

      WSecure

  • 10. 
    _____ is the science of transforming information so that it is secure while it is being transmitted or stored.
    • A. 

      Steganography

    • B. 

      Cryptography

    • C. 

      Encryption

    • D. 

      Ciphering

  • 11. 
    The process of encrypting and decrypting information is based on a mathematical procedure called a(n) _____.
    • A. 

      Cipher

    • B. 

      Key

    • C. 

      Algorithm

    • D. 

      Hash

  • 12. 
    When only trusted users are provided with a cipher and a key to decrypt ciphertext _____ is achieved.
    • A. 

      Confidentiality

    • B. 

      Authentication

    • C. 

      Integrity

    • D. 

      Access control

  • 13. 
    _____ restricts availability to information.
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Nonrepudiation

    • D. 

      Access control

  • 14. 
    Symmetric encryption is also called _____ key cryptography.
    • A. 

      Private

    • B. 

      Public

    • C. 

      Unique

    • D. 

      Session

  • 15. 
    DES encrypts 64-bit plaintext by executing the algorithm _____ times.
    • A. 

      4

    • B. 

      8

    • C. 

      12

    • D. 

      16

  • 16. 
    How many key sizes does RC6 have?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 17. 
    A _____ key is used in public key cryptography.
    • A. 

      Public

    • B. 

      Private

    • C. 

      Secret

    • D. 

      Both a and b

  • 18. 
    The maximum length of a key in most versions of asymmetric algorithms is 16,638 bits, or _____ characters.
    • A. 

      1280

    • B. 

      1536

    • C. 

      2080

    • D. 

      3624

  • 19. 
    The _____ asymmetric algorithm is slower than all other algorithms.
    • A. 

      RSA

    • B. 

      Diffie-Hellman

    • C. 

      Elliptic curve cryptography

    • D. 

      DES

  • 20. 
    A _____ is an encrypted hash of a message that is transmitted along with the message.
    • A. 

      Message digest

    • B. 

      Digital signature

    • C. 

      Cipher

    • D. 

      Hash algorithm

  • 21. 
    EFS uses asymmetric cryptography and a per-_____ encryption key to encrypt and decrypt data.
    • A. 

      User

    • B. 

      Folder

    • C. 

      Volume

    • D. 

      File

  • 22. 
    What is the name of the Windows 2003 Server command liine utility that can be used to encrypt and decrypt files?
    • A. 

      EFS.exe

    • B. 

      Cipher.exe

    • C. 

      Crypto.exe

    • D. 

      Secure.exe

  • 23. 
    If Bob is using symmetric key encryption and wants to securely communicate with 20 other users, how many secret keys must he keep and manage?
    • A. 

      1

    • B. 

      5

    • C. 

      10

    • D. 

      20

  • 24. 
    When using digital signatures, what key does the receiver use to decrypt the digital signature?
    • A. 

      The sender’s private key

    • B. 

      The sender’s public key

    • C. 

      The receiver’s private key

    • D. 

      The receiver’s public key

  • 25. 
    Garret wants to check the certificate status for users on his network.  Where should he access this information?
    • A. 

      Certificate Directory

    • B. 

      Restricted Certificate List

    • C. 

      Certificate Repository

    • D. 

      Certificate Revocation List