Test Practices Questions Missed Flashcards
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
PKI
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
CA
Which of the following certificate formats is used to store a binary representation of a digital certificate?
DER
A digital certificate which allows multiple domains to be protected by a single certificate is known as:
Subject Alternative Name (SAN) certificate
A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:
key escrow
Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?
OCSP stapling
Which digital certificate formats are commonly used to store private keys? (Select 2 answers)
PFX, P12
Which of the answers listed below refers to the most common format in which Certificate Authorities (CA) issue certificates?
PEM
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)
Suitable for large corporate networks
Requires RADIUS authentication server
Which of the EAP methods listed below relies on client-side and server-side certificates to perform authentication?
EAP-TLS
Which of the following EAP methods offers the highest level of security?
EAP-TLS
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
RFID
Which of the following security protocols is the least susceptible to wireless replay attacks?
WPA2-CCMP
What are the characteristic features of the secure version of IMAP? (Select all that apply)
Transport Layer Security (TLS)
TCP port 993
Secure Sockets Layer (SSL)
Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)
Transport Layer Security (TLS)
Secure Sockets Layer (SSL)
TCP port 995
A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)
HTTP over SSL
HTTP over TLS
HTTPS
Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form? (Select all that apply)
SNMPv1
SNMPv2
Which of the following protocols allow(s) for secure file transfer? (Select all that apply)
FTPS
SFTP
SCP
LDAPS is an example of:
Secure directory access protocol
Which protocol enables secure, real-time delivery of audio and video over an IP network?
SRTP
Which of the protocols listed below was designed as a secure replacement for Telnet?
SSH
Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply)
Code obfuscation
Steganography
SSID broadcast suppression
Substitution ciphers
Which of the answers listed below refers to a solution designed to strengthen the security of session keys?
PFS
Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input?
Confusion
Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version?
Diffusion
What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)
Asymmetric encryption
Low processing power requirement
Suitable for small wireless devices
Examples of means that provide randomization during the encryption process include: (Select 3 answers)
Cryptographic nonce
Salting
Initialization Vector (IV)
Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as:
IV
A type of encryption scheme that uses a paired public and private key is known as: (Select 2 answers)
Asymmetric encryption
Public-key encryption