placeholder image to represent content

Sec + CH7

Quiz by cool

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1

    Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt the message?

    Shared secret key 

    David's public key 

    Mike's public key 

    Mike's private key 

    30s
  • Q2

    Alan's team needs to perform computation on sensitive personal information but does not need access to the underlying data. What technology can the team use to perform these calculations without accessing the data?

    Homomorphic encryption 

    Blockchain 

    Quantum computing 

    Certificate pinning 

    30s
  • Q3

    Norm is using full-disk encryption technology to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?

    Integrity 

    Confidentiality 

    Authentication 

    Nonrepudiation 

    30s
  • Q4

    Brian discovers that a user suspected of stealing sensitive information is posting many image files to a message board. What technique might the individual be using to hide sinsitive information in those images?

    Steganography 

    Birthday attack 

    Homomorphic encryption 

    Replay attack 

    30s
  • Q5

    Which one of the following statements about cryptographic keys is incorrect? 

    Asymmetric algorithms generally use longer keys than symmetric algorithms

    Digital certificates are designed to share public keys. 

    Longer keys are better than shorter keys when the same algorithm is used. 

    All cryptographic keys should be kept secret 

    30s
  • Q6

    What type of cipher operates on one character of text at a time?

    Block cipher 

    Bit cipher 

    Stream cipher 

    Balanced cipher 

    30s
  • Q7

    Vince is choosing a symmetric encryption algorithm for use in his organization. He would like to choose the strongest algorithm from the choices below. What algorithm should he choose? 

    AES

    DES 

    RSA 

    3DES

    30s
  • Q8

    Kevin is configuring a web server to use digital certificates. What technology can he use to allow clients to quickly verify the status of that digital certificate without contacting a remote server?

    Certificate pinning 

    CRL 

    Certificate stapling 

    OCSP 

    30s
  • Q9

    Acme Widgets has 10 employees, and they all need the ability to communicate with one another using a symmetric encryption system. The system should allow any two employees to securely communicate without other employees eavesdropping. If an 11th employee is added to the organization, how many new keys must be added to the system?

    11

    10

    1

    2

    30s
  • Q10

    referring to the scenario in question9, if Acme Widgets switched to an asymmetric encryption algorithm, how many keys would be required to add the 11th employee?

    11

    2

    1

    10

    30s
  • Q11

    What type of digital certificate provides the greatest level of assurance that the certificate provides the greatest level of assurance that the certificate owner is who they claim to be?

    OV 

    UV 

    EV 

    DV 

    30s
  • Q12

    Glenn recently abtained a wildcard certificate for *.mydomain.com. Which one of the following domains would not be covered by this certificate?

    dev.www.mydomain.com 

    mydomain.com 

    core.mydomain.com 

    mail.my domain.com 

    30s
  • Q13

    Which one of the following servers is almost always an offline CA in a large PKI deployment?

    Root CA 

    Intermediate CA 

    RA 

    Internal CA

    30s
  • Q14

    Which one of the following certificate formats is closely associated with Windows binary certificate files? 

    PFX

    P7B

    DER 

    PEM 

    30s
  • Q15

    What type of security solution provides a hardware platform for the storage and management of encryption keys? 

    SIEM

    HSM 

    IPS 

    SOAR

    30s

Teachers give this quiz to your class