Quiz Summary
0 of 16 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 16 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 16
1. Question
Which part of a simple cryptographic system must be kept secret for security?
CorrectIncorrect -
Question 2 of 16
2. Question
Why is hashing a useful security technique, even though it cannot be reversed?
CorrectIncorrect -
Question 3 of 16
3. Question
Which security property is primarily assured by symmetric encryption?
CorrectIncorrect -
Question 4 of 16
4. Question
Which of the following describes the properties of a public/private key pair?
CorrectIncorrect -
Question 5 of 16
5. Question
What is the correct process for digitally signing a message?
CorrectIncorrect -
Question 6 of 16
6. Question
How does a subject obtain a certificate from a Certificate Authority (CA)?
CorrectIncorrect -
Question 7 of 16
7. Question
What cryptographic information is stored in a digital certificate?
CorrectIncorrect -
Question 8 of 16
8. Question
Which certificate field supports identification of a server by multiple subdomains?
CorrectIncorrect -
Question 9 of 16
9. Question
If a company loses control of its private key, what could be at risk?
CorrectIncorrect -
Question 10 of 16
10. Question
What is the main risk of key escrow, and how can it be mitigated?
CorrectIncorrect -
Question 11 of 16
11. Question
What mechanism informs clients about suspended or revoked certificates?
CorrectIncorrect -
Question 12 of 16
12. Question
Why is a Hardware Security Module (HSM) often preferred over server-based key management?
CorrectIncorrect -
Question 13 of 16
13. Question
In full-disk encryption, what type of cipher is used for the Key Encryption Key (KEK)?
CorrectIncorrect -
Question 14 of 16
14. Question
True or False: Perfect Forward Secrecy (PFS) ensures that if a server’s private key is compromised, past traffic cannot be decrypted.
CorrectIncorrect -
Question 15 of 16
15. Question
Why does Diffie-Hellman support Perfect Forward Secrecy (PFS)?
CorrectIncorrect -
Question 16 of 16
16. Question
True or False: A salt value must be kept secret to protect a hashed password.
CorrectIncorrect