Tổng hợp câu hỏi trắc nghiệm ôn tập Môn An toàn thông tin Test 10 - có đáp án | Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh

An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the following concepts?Remediation b. Confidentiality
c. Integrity. A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message. Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!

Câu hỏi1
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
An email client says a digital signature is invalid and the sender cannot be
verified. The recipient is concerned with which of the following concepts?
Câu hỏi 1Select one:
a.
Remediation
b.
Confidentiality
c.
Integrity
A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using
the encryption system, and a second piece of information, the digital signature, is
added to the message. Digital Signatures is used to validate the integrity of the
message and the sender. Integrity means the message can’t be altered without
detection.
d.
Availability
Phản hồi
Your answer is correct.
The correct answer is: Integrity
Câu hỏi2
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is used to verify data integrity?
Câu hỏi 2Select one:
a.
RSA
b.
AES
c.
3DES
d.
SHA
SHA stands for “secure hash algorithm”. SHA-1 is the most widely used of the existing
SHA hash functions, and is employed in several widely used applications and protocols
including TLS and SSL, PGP, SSH, S/MIME, and IPsec. It is used to ensure data integrity.
Phản hồi
Your answer is correct.
The correct answer is: SHA
Câu hỏi3
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Pete, an employee, needs a certificate to encrypt data. Which of the following
would issue Pete a certificate?
Câu hỏi 3Select one:
a.
Certificate revocation list
b.
Registration authority
c.
Key escrow
d.
Certification authority
A certificate authority (CA) is an organization that is responsible for issuing, revoking,
and distributing certificates.
Phản hồi
Your answer is correct.
The correct answer is: Certification authority
Câu hỏi4
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Company A submitted a bid on a contract to do work for Company B via email.
Company B was insistent that the bid did not come from Company A. Which of
the following would have assured that the bid was submitted by Company A?
Câu hỏi 4Select one:
a.
Encryption
b.
Hashing
c.
Steganography
d.
Digital Signatures
A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using
the encryption system, and a second piece of information, the digital signature, is
added to the message.
Phản hồi
Your answer is correct.
The correct answer is: Digital Signatures
Câu hỏi5
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which one of the following cannot be achieved by a secret key cryptosystem?
Câu hỏi 5Select one:
a.
Nonrepudiation
Nonrepudiation requires the use of a public key cryptosystem to prevent users from
falsely denying that they originated a message
b.
Availability
c.
Confidentiality
d.
Key distribution
Phản hồi
Your answer is correct.
The correct answer is: Nonrepudiation
Câu hỏi6
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Users need to exchange a shared secret to begin communicating securely.
Which of the following is another name for this symmetric key?
Câu hỏi 6Select one:
a.
Session Key
b.
Public Key
c.
Digital Signature
d.
Private Key
Symmetric algorithms require both ends of an encrypted message to have the same
key and processing algorithms. Symmetric algorithms generate a secret key that must
be protected. A symmetric key, sometimes referred to as a secret key or private key, is
a key that isn’t disclosed to people who aren’t authorized to use the encryption system.
Phản hồi
Your answer is correct.
The correct answer is: Private Key
Câu hỏi7
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following uses both a public and private key?
Câu hỏi 7Select one:
a.
RSA
b.
AES
c.
MD5
d.
SHA
Phản hồi
Your answer is correct.
The correct answer is: RSA
Câu hỏi8
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following are restricted to 64-bit block sizes? (Select TWO).
Câu hỏi 8Select one or more:
a.
RSA
b.
AES256
c.
3DES
d.
AES
e.
PGP
f.
DES
Phản hồi
Your answer is correct.
The correct answers are: DES, 3DES
Câu hỏi9
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A software firm posts patches and updates to a publicly accessible FTP site.
The software firm also posts digitally signed checksums of all patches and
updates. The firm does this to address:
Câu hỏi 9Select one:
a.
Integrity of the server logs.
b.
Availability of the FTP site.
c.
Confidentiality of downloaded software.
d.
Integrity of downloaded software.
Digital Signatures is used to validate the integrity of the message and the sender. In
this case the software firm that posted the patches and updates digitally signed the
checksums of all patches and updates.
Phản hồi
Your answer is correct.
The correct answer is: Integrity of downloaded software.
Câu hỏi10
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
An organization wants to conduct secure transactions of large data files.
Before encrypting and exchanging the data files, the organization wants to
ensure a secure exchange of keys. Which of the following algorithms is
appropriate for securing the key exchange?
Câu hỏi 10Select one:
a.
Diffie-Hellman
b.
3DES
c.
Blowfish
d.
DSA
e.
DES
Phản hồi
Your answer is correct.
The correct answer is: Diffie-Hellman
Câu hỏi11
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is true about asymmetric encryption?
Câu hỏi 11Select one:
a.
A message encrypted with a shared key, can be decrypted by the same key.
b.
A message encrypted with the private key can be decrypted by the same key
c.
A message encrypted with the public key can be decrypted with a shared key.
d.
A message encrypted with the public key can be decrypted with the private key
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric
keys are referred to as the public key and the private key. The sender uses the public
key to encrypt a message, and the receiver uses the private key to decrypt the
message; what one key does, the other one undoes.
Phản hồi
Your answer is correct.
The correct answer is: A message encrypted with the public key can be decrypted with
the private key
Câu hỏi12
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following concepts is used by digital signatures to ensure
integrity of the data?
Câu hỏi 12Select one:
a.
Non-repudiation
b.
Hashing
Most digital signature implementations also use a hash to verify that the message has
not been altered, intentionally or accidently, in transit.
c.
Transport encryption
d.
Key escrow
Phản hồi
Your answer is correct.
The correct answer is: Hashing
Câu hỏi13
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
How many keys are required to fully implement a symmetric algorithm with 10
participants?
Câu hỏi 13Select one:
a.
45
The number of keys required for a symmetric algorithm is dictated by the formula (n*(n–
1))/2, which in this case, where n = 10, is 45.
b.
100
c.
20
d.
10
Phản hồi
Your answer is correct.
The correct answer is: 45
Câu hỏi14
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Digital certificates can be used to ensure which of the following? (Select TWO)
Câu hỏi 14Select one or more:
a.
Verification
b.
Availability
c.
Confidentiality
d.
Authorization
e.
Non-repudiation
Phản hồi
Your answer is correct.
The correct answers are: Confidentiality, Non-repudiation
Câu hỏi15
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Joe, a user, wants to send an encrypted email to Ann. Which of the following
will Ann need to use to verify that the email came from Joe and decrypt it?
(Select TWO).
Câu hỏi 15Select one or more:
a.
The CA’s public key
b.
Joe’s private key
c.
The CA’s private key
d.
Joe’s public key
e.
Ann’s public key
f.
Ann’s private key
Phản hồi
Your answer is correct.
The correct answers are: Ann’s private key, Joe’s public key
Câu hỏi16
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A security administrator must implement a secure key exchange protocol that
will allow company clients to autonomously exchange symmetric encryption
keys over an unencrypted channel. Which of the following MUST be
implemented?
Câu hỏi 16Select one:
a.
AES
b.
Diffie-Hellman
Diffie-Hellman key exchange (D-H) is a means of securely generating symmetric
encryption keys across an insecure medium.
c.
3DES
d.
SHA-256
Phản hồi
Your answer is correct.
The correct answer is: Diffie-Hellman
Câu hỏi17
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is BEST used as a secure replacement for TELNET?
Câu hỏi 17Select one:
a.
GPG
b.
HMAC
c.
HTTPS
d.
SSH
Phản hồi
Your answer is correct.
The correct answer is: SSH
Câu hỏi18
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
How many encryption keys are required to fully implement an asymmetric algorithm
with 10 participants?
Câu hỏi 18Select one:
a.
45
b.
10
c.
20
In an asymmetric algorithm, each participant requires two keys: a public key and a
private key.
d.
100
Phản hồi
Your answer is correct.
The correct answer is: 20
Câu hỏi19
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Protecting the confidentiality of a message is accomplished by encrypting the
message with which of the following?
Câu hỏi 19Select one:
a.
Sender’s public key
b.
Recipient’s private key
c.
Recipient’s public key
To achieve both authentication and confidentiality, the sender should include the
recipient’s name in the message, sign it using his private key, and then encrypt both
the message and
the signature using the recipient’s public key.
d.
Sender’s private key
Phản hồi
Your answer is correct.
The correct answer is: Recipient’s public key
Câu hỏi20
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A system administrator is setting up a file transfer server. The goal is to
encrypt the user authentication and the files the user is sending using only a
user ID and a key pair. Which of the following methods would achieve this
goal?
Câu hỏi 20Select one:
a.
IPSec
b.
PGP
c.
SSH
With SSH you can use automatically generated public-private key pairs to encrypt a
network connection, and then use password authentication to log on. Or you can use a
manually generated public-private key pair to perform the authentication, allowing
users or programs to log in without having to specify a password.
d.
AES
Phản hồi
Your answer is correct.
The correct answer is: SSH
Câu hỏi21
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is used by the recipient of a digitally signed email to
verify the identity of the sender?
Câu hỏi 21Select one:
a.
Sender’s public key
When the sender wants to send a message to the receiver. It’s important that this
message not be altered. The sender uses the private key to create a digital signature.
The message is, in effect, signed with the private key. The sender then sends the
message to the receiver. The recipient uses the public key attached to the message to
validate the digital signature. If the values match, the receiver knows the message is
authentic. Thus the recipient uses the sender’s public key to verify the sender’s identity.
b.
Recipient’s public key
c.
Recipient’s private key
d.
Sender’s private key
Phản hồi
Your answer is correct.
The correct answer is: Sender’s public key
Câu hỏi22
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Digital signatures are used for ensuring which of the following items? (Select
TWO).
Câu hỏi 22Select one or more:
a.
Algorithm strength
b.
Non-Repudiation
c.
Confidentiality
d.
Integrity
A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using
the encryption system, and a second piece of information, the digital signature, is
added to the message. Nonrepudiation prevents one party from denying actions that
they carried out and in the electronic world nonrepudiation measures can be a two-key
cryptographic system and the involvement of a third party to verify the validity. This
respected third party ‘vouches’ for the individuals in the two-key system. Thus non-
repudiation also impacts on integrity.
e.
Availability
Phản hồi
Your answer is correct.
The correct answers are: Integrity, Non-Repudiation
Câu hỏi23
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following provides additional encryption strength by repeating
the encryption process with additional keys?
Câu hỏi 23Select one:
a.
TwoFish
b.
Blowfish
c.
AES
d.
3DES
Phản hồi
Your answer is correct.
The correct answer is: 3DES
Câu hỏi24
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Joe must send Ann a message and provide Ann with assurance that he was the
actual sender. Which of the following will Joe need to use to BEST accomplish
the objective?
Câu hỏi 24Select one:
a.
His public key
b.
A pre-shared private key
c.
Ann’s public key
d.
His private key
To achieve both authentication and confidentiality, Joe should include Ann’s name in the
message, sign it using his private key, and then encrypt both the message and the
signature
using Ann’s public key.
Phản hồi
Your answer is correct.
The correct answer is: His private key
Câu hỏi25
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
An SSL session is taking place. After the handshake phase has been
established and the cipher has been selected, which of the following are
being used to secure data in transport? (Select TWO)
Câu hỏi 25Select one or more:
a.
Ephemeral Key generation
b.
Symmetrical encryption
c.
Asymmetrical encryption
d.
AES
e.
RSA
f.
Diffie-Hellman
Phản hồi
Your answer is correct.
The correct answers are: Diffie-Hellman, RSA
Câu hỏi26
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Symmetric encryption utilizes __________, while asymmetric encryption utilizes
_________.
Câu hỏi 26Select one:
a.
Private keys, public keys
b.
Private keys, session keys
c.
Public keys, one time
d.
Shared keys, private keys
Phản hồi
Your answer is correct.
The correct answer is: Private keys, public keys
Câu hỏi27
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Digital certificates can be used to ensure which of the following? (Select
TWO).
Câu hỏi 27Select one or more:
a.
Confidentiality
b.
Availability
c.
Non-repudiation
Digital Signatures is used to validate the integrity of the message and the sender.
Digital certificates refer to cryptography which is mainly concerned with Confidentiality,
Integrity, Authentication, Nonrepudiation and Access Control. Nonrepudiation prevents
one party from denying actions they carried out.
d.
Verification
e.
Authorization
Phản hồi
Your answer is correct.
The correct answers are: Confidentiality, Non-repudiation
Câu hỏi28
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following symmetric key algorithms are examples of block
ciphers? (Select Two).
Câu hỏi 28Select one or more:
a.
MD5
b.
RC4
c.
AES
d.
PGP
e.
3DES
Phản hồi
Your answer is correct.
The correct answers are: 3DES, AES
Câu hỏi29
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
What is the length of the cryptographic key used in the Data Encryption Standard
(DES) cryptosystem?
Câu hỏi 29Select one:
a.
256 bits
b.
128 bits
c.
56 bits
d.
192 bits
Phản hồi
Your answer is correct.
The correct answer is: 56 bits
Câu hỏi30
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A system administrator is notified by a staff member that their laptop has
been lost. The laptop contains the user’s digital certificate. Which of the
following will help resolve the issue? (Select TWO).
Câu hỏi 30Select one or more:
a.
Revoke the digital certificate
| 1/21

Preview text:

Câu hỏi1 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
An email client says a digital signature is invalid and the sender cannot be
verified. The recipient is concerned with which of the following concepts?
Câu hỏi 1Select one: a. Remediation b. Confidentiality c. Integrity
A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using
the encryption system, and a second piece of information, the digital signature, is
added to the message. Digital Signatures is used to validate the integrity of the
message and the sender. Integrity means the message can’t be altered without detection. d. Availability Phản hồi Your answer is correct.
The correct answer is: Integrity Câu hỏi2 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is used to verify data integrity? Câu hỏi 2Select one: a. RSA b. AES c. 3DES d. SHA
SHA stands for “secure hash algorithm”. SHA-1 is the most widely used of the existing
SHA hash functions, and is employed in several widely used applications and protocols
including TLS and SSL, PGP, SSH, S/MIME, and IPsec. It is used to ensure data integrity. Phản hồi Your answer is correct. The correct answer is: SHA Câu hỏi3 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Pete, an employee, needs a certificate to encrypt data. Which of the following
would issue Pete a certificate?
Câu hỏi 3Select one: a. Certificate revocation list b. Registration authority c. Key escrow d. Certification authority
A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing certificates. Phản hồi Your answer is correct.
The correct answer is: Certification authority Câu hỏi4 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Company A submitted a bid on a contract to do work for Company B via email.
Company B was insistent that the bid did not come from Company A. Which of
the following would have assured that the bid was submitted by Company A?
Câu hỏi 4Select one: a. Encryption b. Hashing c. Steganography d. Digital Signatures
A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using
the encryption system, and a second piece of information, the digital signature, is added to the message. Phản hồi Your answer is correct.
The correct answer is: Digital Signatures Câu hỏi5 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which one of the following cannot be achieved by a secret key cryptosystem? Câu hỏi 5Select one: a. Nonrepudiation
Nonrepudiation requires the use of a public key cryptosystem to prevent users from
falsely denying that they originated a message b. Availability c. Confidentiality d. Key distribution Phản hồi Your answer is correct.
The correct answer is: Nonrepudiation Câu hỏi6 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Users need to exchange a shared secret to begin communicating securely.
Which of the following is another name for this symmetric key?
Câu hỏi 6Select one: a. Session Key b. Public Key c. Digital Signature d. Private Key
Symmetric algorithms require both ends of an encrypted message to have the same
key and processing algorithms. Symmetric algorithms generate a secret key that must
be protected. A symmetric key, sometimes referred to as a secret key or private key, is
a key that isn’t disclosed to people who aren’t authorized to use the encryption system. Phản hồi Your answer is correct.
The correct answer is: Private Key Câu hỏi7 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following uses both a public and private key? Câu hỏi 7Select one: a. RSA b. AES c. MD5 d. SHA Phản hồi Your answer is correct. The correct answer is: RSA Câu hỏi8 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following are restricted to 64-bit block sizes? (Select TWO).
Câu hỏi 8Select one or more: a. RSA b. AES256 c. 3DES d. AES e. PGP f. DES Phản hồi Your answer is correct.
The correct answers are: DES, 3DES Câu hỏi9 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A software firm posts patches and updates to a publicly accessible FTP site.
The software firm also posts digitally signed checksums of all patches and
updates. The firm does this to address:
Câu hỏi 9Select one: a. Integrity of the server logs. b. Availability of the FTP site. c.
Confidentiality of downloaded software. d.
Integrity of downloaded software.
Digital Signatures is used to validate the integrity of the message and the sender. In
this case the software firm that posted the patches and updates digitally signed the
checksums of all patches and updates. Phản hồi Your answer is correct.
The correct answer is: Integrity of downloaded software. Câu hỏi10 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
An organization wants to conduct secure transactions of large data files.
Before encrypting and exchanging the data files, the organization wants to
ensure a secure exchange of keys. Which of the following algorithms is
appropriate for securing the key exchange?
Câu hỏi 10Select one: a. Diffie-Hellman b. 3DES c. Blowfish d. DSA e. DES Phản hồi Your answer is correct.
The correct answer is: Diffie-Hellman Câu hỏi11 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is true about asymmetric encryption? Câu hỏi 11Select one: a.
A message encrypted with a shared key, can be decrypted by the same key. b.
A message encrypted with the private key can be decrypted by the same key c.
A message encrypted with the public key can be decrypted with a shared key. d.
A message encrypted with the public key can be decrypted with the private key
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric
keys are referred to as the public key and the private key. The sender uses the public
key to encrypt a message, and the receiver uses the private key to decrypt the
message; what one key does, the other one undoes. Phản hồi Your answer is correct.
The correct answer is: A message encrypted with the public key can be decrypted with the private key Câu hỏi12 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following concepts is used by digital signatures to ensure integrity of the data? Câu hỏi 12Select one: a. Non-repudiation b. Hashing
Most digital signature implementations also use a hash to verify that the message has
not been altered, intentionally or accidently, in transit. c. Transport encryption d. Key escrow Phản hồi Your answer is correct. The correct answer is: Hashing Câu hỏi13 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
How many keys are required to fully implement a symmetric algorithm with 10 participants? Câu hỏi 13Select one: a. 45
The number of keys required for a symmetric algorithm is dictated by the formula (n*(n–
1))/2, which in this case, where n = 10, is 45. b. 100 c. 20 d. 10 Phản hồi Your answer is correct. The correct answer is: 45 Câu hỏi14 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Digital certificates can be used to ensure which of the following? (Select TWO)
Câu hỏi 14Select one or more: a. Verification b. Availability c. Confidentiality d. Authorization e. Non-repudiation Phản hồi Your answer is correct.
The correct answers are: Confidentiality, Non-repudiation Câu hỏi15 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Joe, a user, wants to send an encrypted email to Ann. Which of the following
will Ann need to use to verify that the email came from Joe and decrypt it? (Select TWO).

Câu hỏi 15Select one or more: a. The CA’s public key b. Joe’s private key c. The CA’s private key d. Joe’s public key e. Ann’s public key f. Ann’s private key Phản hồi Your answer is correct.
The correct answers are: Ann’s private key, Joe’s public key Câu hỏi16 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A security administrator must implement a secure key exchange protocol that
will allow company clients to autonomously exchange symmetric encryption
keys over an unencrypted channel. Which of the following MUST be implemented?
Câu hỏi 16Select one: a. AES b. Diffie-Hellman
Diffie-Hellman key exchange (D-H) is a means of securely generating symmetric
encryption keys across an insecure medium. c. 3DES d. SHA-256 Phản hồi Your answer is correct.
The correct answer is: Diffie-Hellman Câu hỏi17 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is BEST used as a secure replacement for TELNET? Câu hỏi 17Select one: a. GPG b. HMAC c. HTTPS d. SSH Phản hồi Your answer is correct. The correct answer is: SSH Câu hỏi18 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
How many encryption keys are required to fully implement an asymmetric algorithm with 10 participants? Câu hỏi 18Select one: a. 45 b. 10 c. 20
In an asymmetric algorithm, each participant requires two keys: a public key and a private key. d. 100 Phản hồi Your answer is correct. The correct answer is: 20 Câu hỏi19 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Protecting the confidentiality of a message is accomplished by encrypting the
message with which of the following?
Câu hỏi 19Select one: a. Sender’s public key b. Recipient’s private key c. Recipient’s public key
To achieve both authentication and confidentiality, the sender should include the
recipient’s name in the message, sign it using his private key, and then encrypt both the message and
the signature using the recipient’s public key. d. Sender’s private key Phản hồi Your answer is correct.
The correct answer is: Recipient’s public key Câu hỏi20 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A system administrator is setting up a file transfer server. The goal is to
encrypt the user authentication and the files the user is sending using only a
user ID and a key pair. Which of the following methods would achieve this goal?
Câu hỏi 20Select one: a. IPSec b. PGP c. SSH
With SSH you can use automatically generated public-private key pairs to encrypt a
network connection, and then use password authentication to log on. Or you can use a
manually generated public-private key pair to perform the authentication, allowing
users or programs to log in without having to specify a password. d. AES Phản hồi Your answer is correct. The correct answer is: SSH Câu hỏi21 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is used by the recipient of a digitally signed email to
verify the identity of the sender?
Câu hỏi 21Select one: a. Sender’s public key
When the sender wants to send a message to the receiver. It’s important that this
message not be altered. The sender uses the private key to create a digital signature.
The message is, in effect, signed with the private key. The sender then sends the
message to the receiver. The recipient uses the public key attached to the message to
validate the digital signature. If the values match, the receiver knows the message is
authentic. Thus the recipient uses the sender’s public key to verify the sender’s identity. b. Recipient’s public key c. Recipient’s private key d. Sender’s private key Phản hồi Your answer is correct.
The correct answer is: Sender’s public key Câu hỏi22 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Digital signatures are used for ensuring which of the following items? (Select TWO).
Câu hỏi 22Select one or more: a. Algorithm strength b. Non-Repudiation c. Confidentiality d. Integrity
A digital signature is similar in function to a standard signature on a document. It
validates the integrity of the message and the sender. The message is encrypted using
the encryption system, and a second piece of information, the digital signature, is
added to the message. Nonrepudiation prevents one party from denying actions that
they carried out and in the electronic world nonrepudiation measures can be a two-key
cryptographic system and the involvement of a third party to verify the validity. This
respected third party ‘vouches’ for the individuals in the two-key system. Thus non-
repudiation also impacts on integrity. e. Availability Phản hồi Your answer is correct.
The correct answers are: Integrity, Non-Repudiation Câu hỏi23 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following provides additional encryption strength by repeating
the encryption process with additional keys?
Câu hỏi 23Select one: a. TwoFish b. Blowfish c. AES d. 3DES Phản hồi Your answer is correct. The correct answer is: 3DES Câu hỏi24 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Joe must send Ann a message and provide Ann with assurance that he was the
actual sender. Which of the following will Joe need to use to BEST accomplish the objective?
Câu hỏi 24Select one: a. His public key b. A pre-shared private key c. Ann’s public key d. His private key
To achieve both authentication and confidentiality, Joe should include Ann’s name in the
message, sign it using his private key, and then encrypt both the message and the signature using Ann’s public key. Phản hồi Your answer is correct.
The correct answer is: His private key Câu hỏi25 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
An SSL session is taking place. After the handshake phase has been
established and the cipher has been selected, which of the following are
being used to secure data in transport? (Select TWO)

Câu hỏi 25Select one or more: a. Ephemeral Key generation b. Symmetrical encryption c. Asymmetrical encryption d. AES e. RSA f. Diffie-Hellman Phản hồi Your answer is correct.
The correct answers are: Diffie-Hellman, RSA Câu hỏi26 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________. Câu hỏi 26Select one: a. Private keys, public keys b. Private keys, session keys c. Public keys, one time d. Shared keys, private keys Phản hồi Your answer is correct.
The correct answer is: Private keys, public keys Câu hỏi27 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Digital certificates can be used to ensure which of the following? (Select TWO).
Câu hỏi 27Select one or more: a. Confidentiality b. Availability c. Non-repudiation
Digital Signatures is used to validate the integrity of the message and the sender.
Digital certificates refer to cryptography which is mainly concerned with Confidentiality,
Integrity, Authentication, Nonrepudiation and Access Control. Nonrepudiation prevents
one party from denying actions they carried out. d. Verification e. Authorization Phản hồi Your answer is correct.
The correct answers are: Confidentiality, Non-repudiation Câu hỏi28 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following symmetric key algorithms are examples of block ciphers? (Select Two).
Câu hỏi 28Select one or more: a. MD5 b. RC4 c. AES d. PGP e. 3DES Phản hồi Your answer is correct.
The correct answers are: 3DES, AES Câu hỏi29 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What is the length of the cryptographic key used in the Data Encryption Standard (DES) cryptosystem? Câu hỏi 29Select one: a. 256 bits b. 128 bits c. 56 bits d. 192 bits Phản hồi Your answer is correct. The correct answer is: 56 bits Câu hỏi30 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A system administrator is notified by a staff member that their laptop has
been lost. The laptop contains the user’s digital certificate. Which of the
following will help resolve the issue? (Select TWO).

Câu hỏi 30Select one or more: a. Revoke the digital certificate