Network Security (Basics)
Quiz by Yauhen Arnatovich
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
What a cryptographic hash function can provide?
Authenticity
Integrity
Privacy
Availability
30s - Q2
To generate a digital signature, which entity will you use?
Public key
Key-based hashing
Certificate
Private key
30s - Q3
Public-key cryptography solves the problem of ___ ?
Key derivation
Key reservation
Key validation
Key distribution
30s - Q4
Communication using TLS begins with ___ ?
Ping
Proposal
Handshake
Vote
30s - Q5
To provide confidentiality for a large amount of data, what cryptography will you use?
Symmetric
Hash
Asymmetric
Any of them
30s - Q6
Which of the following can be a root CA?
GlobalSign
DigiCert
Entrust
All of them
30s - Q7
In public-key cryptography, data can be encrypted/decrypted with ___ keys?
Private only
Public only
Symmetric
Private or public
30s - Q8
In public-key cryptography, a message shall be signed with ___ keys?
Hash
Public only
Private only
Private or public
30s - Q9
What is the minimum key size recommended to use today for data protection?
1024
2048
512
3072
30s - Q10
TLS can be used by ___ ?
Emails and messages
Web applications and servers
All of them
VoIP
30s - Q11
The TLS protocol provides ___ ?
Manageability
Confidentiality
Reliability
Availability
30s