Info Security Chapter 4

Create an engaging and informative illustration representing information security themes, such as cryptography, digital certificates, and secure communications, with elements like locks, keys, and computer networks.

Info Security Quiz: Chapter 4

Test your knowledge on information security concepts with our comprehensive quiz based on Chapter 4. Whether you're a student, professional, or just an enthusiast, this quiz covers essential topics in cryptography and digital certificates.

  • 20 multiple-choice questions
  • Instant feedback on your answers
  • Enhance your understanding of key concepts
20 Questions5 MinutesCreated by SecureKey101
Which of the following is NOT a method for strengthening a key?
Randomness
Cryptoperiod
Length
Variability
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?
Electronic Code Book (ECB)
Galois/Counter (GCM)
Counter (CTR)
Cipher Block Chaining (CBC)
What entity calls in crypto modules to perform cryptographic tasks?
Certificate Authority (CA)
OCSP Chain
Intermediate CA
Crypto service provider
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
Encrypted signatures
Session keys
Digital certificates
Digital digests
Which of these is considered the strongest cryptographic transport protocol?
TLS v1.2
TLS v1.0
SSL v2.0
SSL v2.0
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.
Digital signature
Encrypted signature
Digest
Digital certificate
A digital certificate associates _____.
A user’s public key with his private key
The user’s identity with his public key
A user’s private key with the public key
A private key with a digital signature
Digital certificates can be used for each of these EXCEPT _____.
To verify the authenticity of the Registration Authorizer
To encrypt channels to provide secure communication between clients and servers
To verify the identity of clients and servers on the Web
To encrypt messages for secure email communications
An entity that issues digital certificates is a _____.
Certificate Signatory (CS)
Digital Signer (DS)
Certificate Authority (CA)
Signature Authority (SA)
A centralized directory of digital certificates is called a(n) _____.
Digital Signature Permitted Authorization (DSPA)
Digital Signature Approval List (DSAP)
Certificate Repository (CR)
Authorized Digital Signature (ADS)
_____ performs a real-time lookup of a digital certificate’s status.
Certificate Revocation List (CRL)
Real-Time CA Verification (RTCAV)
Online Certificate Status Protocol (OCSP)
CA Registry Database (CARD)
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?
Algorithm
Initialization vector (IV)
Nonce
Salt
Which digital certificate displays the name of the entity behind the website?
Online Certificate Status Certificate
Extended Validation (EV) Certificate
Session Certificate
X.509 Certificate
Which trust model has multiple CAs, one of which acts as a facilitator?
Bridge
Hierarchical
Distributed
Web
Which statement is NOT true regarding hierarchical trust models?
It is designed for use on a large scale.
The root signs all digital certificate authorities with a single key.
It assigns a single hierarchy with one master CA.
The master CA is called the root.
Public key infrastructure (PKI) _____.
Generates public/private keys automatically
Creates private key cryptography
Is the management of digital certificates
Requires the use of an RA instead of a CA
A(n) _____ is a published set of rules that govern the operation of a PKI.
Signature resource guide (SRG)
Enforcement certificate (EF)
Certificate practice statement (CPS)
Certificate policy (CP)
Which of these is NOT part of the certificate life cycle?
Expiration
Revocation
Authorization
Creation
_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.
Key authorization
Key escrow
Remote key administration
Trusted key authority
_____ is a protocol for securely accessing a remote computer.
Transport Layer Security (TLS)
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Secure Hypertext Transport Protocol (SHTTP)
{"name":"Info Security Chapter 4", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on information security concepts with our comprehensive quiz based on Chapter 4. Whether you're a student, professional, or just an enthusiast, this quiz covers essential topics in cryptography and digital certificates.20 multiple-choice questionsInstant feedback on your answersEnhance your understanding of key concepts","img":"https:/images/course6.png"}
Powered by: Quiz Maker