
Sec + CH7
Quiz by cool
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Mike is sending David an encrypted message using a symmetric encryption algorithm. What key should he use to encrypt the message?
Shared secret key
David's public key
Mike's public key
Mike's private key
30s - Q2
Alan's team needs to perform computation on sensitive personal information but does not need access to the underlying data. What technology can the team use to perform these calculations without accessing the data?
Homomorphic encryption
Blockchain
Quantum computing
Certificate pinning
30s - Q3
Norm is using full-disk encryption technology to protect the contents of laptops against theft. What goal of cryptography is he attempting to achieve?
Integrity
Confidentiality
Authentication
Nonrepudiation
30s - Q4
Brian discovers that a user suspected of stealing sensitive information is posting many image files to a message board. What technique might the individual be using to hide sinsitive information in those images?
Steganography
Birthday attack
Homomorphic encryption
Replay attack
30s - Q5
Which one of the following statements about cryptographic keys is incorrect?
Asymmetric algorithms generally use longer keys than symmetric algorithms
Digital certificates are designed to share public keys.
Longer keys are better than shorter keys when the same algorithm is used.
All cryptographic keys should be kept secret
30s - Q6
What type of cipher operates on one character of text at a time?
Block cipher
Bit cipher
Stream cipher
Balanced cipher
30s - Q7
Vince is choosing a symmetric encryption algorithm for use in his organization. He would like to choose the strongest algorithm from the choices below. What algorithm should he choose?
AES
DES
RSA
3DES
30s - Q8
Kevin is configuring a web server to use digital certificates. What technology can he use to allow clients to quickly verify the status of that digital certificate without contacting a remote server?
Certificate pinning
CRL
Certificate stapling
OCSP
30s - Q9
Acme Widgets has 10 employees, and they all need the ability to communicate with one another using a symmetric encryption system. The system should allow any two employees to securely communicate without other employees eavesdropping. If an 11th employee is added to the organization, how many new keys must be added to the system?
11
10
1
2
30s - Q10
referring to the scenario in question9, if Acme Widgets switched to an asymmetric encryption algorithm, how many keys would be required to add the 11th employee?
11
2
1
10
30s - Q11
What type of digital certificate provides the greatest level of assurance that the certificate provides the greatest level of assurance that the certificate owner is who they claim to be?
OV
UV
EV
DV
30s - Q12
Glenn recently abtained a wildcard certificate for *.mydomain.com. Which one of the following domains would not be covered by this certificate?
dev.www.mydomain.com
mydomain.com
core.mydomain.com
mail.my domain.com
30s - Q13
Which one of the following servers is almost always an offline CA in a large PKI deployment?
Root CA
Intermediate CA
RA
Internal CA
30s - Q14
Which one of the following certificate formats is closely associated with Windows binary certificate files?
PFX
P7B
DER
PEM
30s - Q15
What type of security solution provides a hardware platform for the storage and management of encryption keys?
SIEM
HSM
IPS
SOAR
30s