Question

Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

Information Security
I got 8/10 so please figure out which 2 answer is wrong.

Question 1 (1 point)

Dropbox is a typical example of SaaS in cloud computing.

Question 1 options:

True
False

T

Question 2 (1 point)

SSL cannot be combined with VPN.

Question 2 options:

True
False

F

Question 3 (1 point)

A remote access server can provide authentication services.

Question 3 options:

True
False

T

Question 4 (1 point)

In general, private key encryption is safer than public key encryption.

Question 4 options:

True
False

T

Question 5 (1 point)

TLS will encrypt TCP/IP transmissions.

Question 5 options:

True
False

T

Question 6 (1 point)

Which one is NOT an authentication protocol?

Question 6 options:

RADIUS

TACACS+

CHAP

SHA-3

SHA-3

Question 7 (1 point)

For the Kerberos protocol, which one is NOT correct?

Question 7 options:

It is a cross-platform authentication protocol

TGS refers to ticket granting service

It requires one ticket before getting a session from a server

It uses private key encryption to verify client identity

It used private key encryption to verify client identity.

Question 8 (1 point)

In CHAP protocol, how many ways of handshake will be used?

Question 8 options:

2

3

4

none of them

3

Question 9 (1 point)

Which one exploits private key encryption?

Question 9 options:

certificate

signature

message digest

all of them

Signature

Question 10 (1 point)

Which statement is NOT correct?

Question 10 options:

digital certificates are managed by CAs

asymmetric encryption uses 2 keys

a certificate, a CA's signature and a user's public key cannot be sent together.

none of them

a certificate, a CA's signature and a user's public key cannot be sent together.

Submit Quiz10 of 10 questions saved

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)Dropbox is an example of IaaS

False

4)public key encryption is safer than private key encryption

False

Add a comment
Know the answer?
Add Answer to:
Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Question 5 (1 point) Saved Which one is the least important reason for the company to...

    Question 5 (1 point) Saved Which one is the least important reason for the company to use Agile Method using prototype rather than SDLC? Market share System security User satisfaction Cost Question 6 (1 point) A digital certificate system uses receiver's private key uses user's CAs (Certificate Authorities) to validate a user's identity certifies sender's identity uses tokens to certify receiver's identity Question 7 (1 point) In a parallel conversion strategy, the new system is introduced in stages is tested...

  • Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on...

    Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma...

    Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture. Question 11 options: 160 X 10 ^9 160 X 10^36 160 X 10^72 160 X 10^18 Question 12 (1 point) PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the...

  • QUESTION 1 Bob has received Alice's public key. Which one of the following is NOT a...

    QUESTION 1 Bob has received Alice's public key. Which one of the following is NOT a step that Bob must take to process her key? O 1. Sign the key 2. Import the key into the WinPT Key Manager 3. Enter his e-mail address O 4. Verify the fingerprint for the key QUESTION 2 Bob has just installed GPG for his operating system. Which one of the following items O 1. His email address O 2. The email address of...

  • Java Questions A class must implement at least one interface. Question 1 options: True False Question...

    Java Questions A class must implement at least one interface. Question 1 options: True False Question 2 (1 point) Abstract methods can be called. Question 2 options: True False Question 3 (1 point) Constructors Question 3 options: Are inherited but cannot be accessed Are inherited and can be accessed Are accessible but are not inherited Are not inherited and cannot be accessed Question 4 (1 point) We can instantiate an object from an abstract class. Question 4 options: True False...

  • Question 1 (10 points) 5-12 Which of the following is the command to launch the Local...

    Question 1 (10 points) 5-12 Which of the following is the command to launch the Local User Manager? Question 1 options: lusrmgr.msc lusermgmt.msc localuser.msc lusrmgmt.msc Question 2 (10 points) 5-7 Which of the following is the default group membership of all users added after installation of the operating system (not the user added during installation)? Question 2 options: Users Backup operator Guests Administrators Question 3 (10 points) 5-3 Which account type is also knows as a Work Account? Question 3...

  • QUESTION 1 1.      A certificate authority is a trusted third party that is responsible for issuing and...

    QUESTION 1 1.      A certificate authority is a trusted third party that is responsible for issuing and revoking certificates within the public key infrastructure. True False 10 points    QUESTION 2 1.      Access control systems can be deployed as stand-alone systems. True False 10 points    QUESTION 3 1.      Which is the most critical factor in the success of a Access Control system? a. Network integration b. Availability c. Accuracy d. User acceptance 10 points    QUESTION 4 1.      Haptic is a concept pertaining...

  • Please help with my knowledge quiz I got 4/5 and I am not sure which on...

    Please help with my knowledge quiz I got 4/5 and I am not sure which on was wrong. Here are the questions: Question 1 (1 point) ________ model of human sexual response has four stages. Question 1 options: A) Kaplan’s B) Loulan’s C) Kinsey’s D) Masters’ and Johnson’s Question 2 (1 point) In this stage of Loulan’s model, there may be no noticeable physiological changes but the person feels sexually aroused. Question 2 options: A) Willingness B) Sexual Desire C)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT