Information Security
I got 8/10 so please figure out which 2 answer is
wrong.
Question 1 (1 point)
Dropbox is a typical example of SaaS in cloud computing.
Question 1 options:
True | |
False |
T
Question 2 (1 point)
SSL cannot be combined with VPN.
Question 2 options:
True | |
False |
F
Question 3 (1 point)
A remote access server can provide authentication services.
Question 3 options:
True | |
False |
T
Question 4 (1 point)
In general, private key encryption is safer than public key encryption.
Question 4 options:
True | |
False |
T
Question 5 (1 point)
TLS will encrypt TCP/IP transmissions.
Question 5 options:
True | |
False |
T
Question 6 (1 point)
Which one is NOT an authentication protocol?
Question 6 options:
RADIUS |
|
TACACS+ |
|
CHAP |
|
SHA-3 |
SHA-3
Question 7 (1 point)
For the Kerberos protocol, which one is NOT correct?
Question 7 options:
It is a cross-platform authentication protocol |
|
TGS refers to ticket granting service |
|
It requires one ticket before getting a session from a server |
|
It uses private key encryption to verify client identity |
It used private key encryption to verify client identity.
Question 8 (1 point)
In CHAP protocol, how many ways of handshake will be used?
Question 8 options:
2 |
|
3 |
|
4 |
|
none of them |
3
Question 9 (1 point)
Which one exploits private key encryption?
Question 9 options:
certificate |
|
signature |
|
message digest |
|
all of them |
Signature
Question 10 (1 point)
Which statement is NOT correct?
Question 10 options:
digital certificates are managed by CAs |
|
asymmetric encryption uses 2 keys |
|
a certificate, a CA's signature and a user's public key cannot be sent together. |
|
none of them |
a certificate, a CA's signature and a user's public key cannot be sent together.
Submit Quiz10 of 10 questions saved
1)Dropbox is an example of IaaS
False
4)public key encryption is safer than private key encryption
False
Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...
Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...
Question 5 (1 point) Saved Which one is the least important reason for the company to use Agile Method using prototype rather than SDLC? Market share System security User satisfaction Cost Question 6 (1 point) A digital certificate system uses receiver's private key uses user's CAs (Certificate Authorities) to validate a user's identity certifies sender's identity uses tokens to certify receiver's identity Question 7 (1 point) In a parallel conversion strategy, the new system is introduced in stages is tested...
Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...
RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...
Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture. Question 11 options: 160 X 10 ^9 160 X 10^36 160 X 10^72 160 X 10^18 Question 12 (1 point) PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the...
QUESTION 1 Bob has received Alice's public key. Which one of the following is NOT a step that Bob must take to process her key? O 1. Sign the key 2. Import the key into the WinPT Key Manager 3. Enter his e-mail address O 4. Verify the fingerprint for the key QUESTION 2 Bob has just installed GPG for his operating system. Which one of the following items O 1. His email address O 2. The email address of...
Java Questions A class must implement at least one interface. Question 1 options: True False Question 2 (1 point) Abstract methods can be called. Question 2 options: True False Question 3 (1 point) Constructors Question 3 options: Are inherited but cannot be accessed Are inherited and can be accessed Are accessible but are not inherited Are not inherited and cannot be accessed Question 4 (1 point) We can instantiate an object from an abstract class. Question 4 options: True False...
Question 1 (10 points) 5-12 Which of the following is the command to launch the Local User Manager? Question 1 options: lusrmgr.msc lusermgmt.msc localuser.msc lusrmgmt.msc Question 2 (10 points) 5-7 Which of the following is the default group membership of all users added after installation of the operating system (not the user added during installation)? Question 2 options: Users Backup operator Guests Administrators Question 3 (10 points) 5-3 Which account type is also knows as a Work Account? Question 3...
QUESTION 1 1. A certificate authority is a trusted third party that is responsible for issuing and revoking certificates within the public key infrastructure. True False 10 points QUESTION 2 1. Access control systems can be deployed as stand-alone systems. True False 10 points QUESTION 3 1. Which is the most critical factor in the success of a Access Control system? a. Network integration b. Availability c. Accuracy d. User acceptance 10 points QUESTION 4 1. Haptic is a concept pertaining...
Please help with my knowledge quiz I got 4/5 and I am not sure which on was wrong. Here are the questions: Question 1 (1 point) ________ model of human sexual response has four stages. Question 1 options: A) Kaplan’s B) Loulan’s C) Kinsey’s D) Masters’ and Johnson’s Question 2 (1 point) In this stage of Loulan’s model, there may be no noticeable physiological changes but the person feels sexually aroused. Question 2 options: A) Willingness B) Sexual Desire C)...