Data Protection with Cryptography Flashcards
You need to order an HSM solution for your data center. Which options are available?
Instruction: Choose all options that best answer the question.
Answer Choices
Network-attached appliance
PCIe card
Cloud-based virtual machine
Firmware chip added to server motherboard
Network-attached appliance
PCIe card
Which VPN protocol is commonly used with IPSec?
Instruction: Choose the option that best answers the question.
Answer Choices
L2TP
SSL
TLS
PPTP
L2TP
Which item is NOT stored in a PKI certificate?
Instruction: Choose the option that best answers the question.
Answer Choices
Expiry date
Subject name
Private key
Public key
Private key
Which term identifies encrypted data?
Instruction: Choose the option that best answers the question.
Answer Choices
Plain text
Ciphertext
Hash value
Algorithm
Ciphertext
What is the default listening port number for HTTPS?
Instruction: Choose the option that best answers the question.
Answer Choices
22
80
443
25
443
Which IPSec configuration enables encrypted packet payload?
Instruction: Choose the option that best answers the question.
Answer Choices
ESP
SLA
AH
CIA
ESP
Which Microsoft PowerShell cmdlet is used to generate a file hash?
Instruction: Choose the option that best answers the question.
Answer Choices
Set-FileHash
Add-FileHash
New-FileHash
Get-FileHash
Get-FileHash
You would like to only boot the OS on a host from trusted OS files. What is required to do this?
Instruction: Choose all options that best answer the question.
Answer Choices
BIOS with secure boot enabled
TPM
HSM
UEFI with secure boot enabled
TPM
UEFI with secure boot enabled
Hashing applies to which aspect of the CIA security triad?
Instruction: Choose the option that best answers the question.
Answer Choices
Integrity
Availability
Authentication
Confidentiality
Integrity
Which PKI standards are used for revoked certificates?
Instruction: Choose all options that best answer the question.
Answer Choices
ESP
OCSP
SLA
CRL
OCSP
CRL