Question 1 (1 point)
Saved
Which of the following is used to associate a public key with an identity?
Question 1 options:
Digital hash
Digital certificate
Digital signature
Encryption
Question 2 (1 point)
Saved
Which of the following statements about asymmetric key cryptography is true?
Question 2 options:
Asymmetric key cryptography is also called private key cryptography.
Asymmetric key cryptography uses one shared key.
Asymmetric key cryptography is also called public key cryptography.
Asymmetric key cryptography uses two keys called public keys.
Question 3 (1 point)
Saved
Which of the following issues and maintains digital certificates?
Question 3 options:
Registration authority
Certification authority
Public key infrastructure
Client nodes
Question 4 (1 point)
Saved
Which of the following tasks is part of the disposal phase of the SDLC?
Question 4 options:
Adding hardware and software
Authorization
Archiving information and sanitization of media
Conducting risk assessment
Question 5 (1 point)
Saved
Identification of compliance requirements is done during which of the following phases of the
SDLC?
Question 5 options:
Development/acquisition
Implementation/assessment
Initiation
Operations/maintenance
Question 6 (1 point)
Which of the following is the most common web application security flaw?
Question 6 options:
Static data validation
Dynamic data validation
Failure to validate output
Failure to validate input
Question 7 (1 point)
Saved
Which of the following is one of the most popular symmetric algorithms of recent years?
Question 7 options:
DES
AES
IPsec
RSA
Question 8 (1 point)
Saved
Which of the following statements about symmetric key cryptography is not true?
Question 8 options:
Symmetric key cryptography uses one shared key.
Symmetric algorithms can provide confidentiality.
Symmetric key cryptography uses a single secret key.
Symmetric algorithms can provide nonrepudiation and authenticity.
Question 9 (1 point)
Saved
Which of the following is the process of creating a numeric value that represents the original
text?
Question 9 options:
Encryption
Decryption
Hashing
Key management
Question 10 (1 point)
Saved
Which of the following provides confidentiality?
Question 10 options:
Key management
Decryption
Encryption
Hashing
Question 11 (1 point)
Public key cryptography uses which of the following?
Question 11 options:
A private key
A public key
Both a public and a private key
A shared key
Question 12 (1 point)
Which of the following provides a standardized process for all phases of any system
development or acquisition effort?
Question 12 options:
NIST
SDLC
CIA
COTS
Question 13 (1 point)
Which of the following is an open community dedicated to enabling organizations to develop,
purchase, and maintain applications that can be trusted?
Question 13 options:
GLBA
MITRE
NIST
OWASP
Question 14 (1 point)
Which of the following components of PKI performs the administrative functions, including
verifying the identity of users and organizations requesting a digital certificate?
Question 14 options:
Client nodes
Digital certificate
Certification authority
Registration authority
Question 15 (1 point)
Which of the following is not a best practice for cryptographic key management?
Question 15 options:
Keys should be properly destroyed when their lifetime ends.
Keys should be transmitted and stored by secure means.
Key values should be random, and the full spectrum of the keyspace should be used.
Keys should be presented in clear text.
Digital hash
Digital certificate
Digital signature
Encryption

More Related Content

PDF
Online e voting
PDF
Question 16 (1 point) Which of the following best describes the diff.pdf
PPTX
The Future Of Threat Intelligence Platforms
PPT
Securing Citizen Facing Applications
PDF
Identity-Based Key Management in MANETs Using Public Key Cryptography
DOCX
Cis 552 final exam solution
DOCX
Question 11.  A security manager wishes to objectively measure.docx
PDF
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
Online e voting
Question 16 (1 point) Which of the following best describes the diff.pdf
The Future Of Threat Intelligence Platforms
Securing Citizen Facing Applications
Identity-Based Key Management in MANETs Using Public Key Cryptography
Cis 552 final exam solution
Question 11.  A security manager wishes to objectively measure.docx
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...

Similar to Question 1 (1 point)SavedWhich of the following is used to ass.pdf (20)

PDF
CIS 333 Life of the Mind/newtonhelp.com   
DOCX
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
DOC
CIS 333 Imagine Your Future/newtonhelp.com   
PDF
Electronic voting system security
DOC
CIS 333 Focus Dreams/newtonhelp.com
PDF
CMIT 321 QUIZ 3
PPTX
Keystroke Dynamics Support For Authentication
DOCX
Cis 333 Extraordinary Success/newtonhelp.com
PDF
Hacking - CEH Cheat Sheet Exercises.pdf
PDF
Human Factors in Cyber Security: User authentication as a use case
PDF
CMIT 321 WEEK 2 QUIZ
PPTX
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
DOC
Cis 333 Education Organization / snaptutorial.com
PDF
[Warsaw 26.06.2018] SDL Threat Modeling principles
PDF
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
PDF
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
PPTX
Will future vehicles be secure?
PDF
PPTX
data analysing and recovery using the tool
PDF
Endpoint Security for Mobile Devices
CIS 333 Life of the Mind/newtonhelp.com   
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
CIS 333 Imagine Your Future/newtonhelp.com   
Electronic voting system security
CIS 333 Focus Dreams/newtonhelp.com
CMIT 321 QUIZ 3
Keystroke Dynamics Support For Authentication
Cis 333 Extraordinary Success/newtonhelp.com
Hacking - CEH Cheat Sheet Exercises.pdf
Human Factors in Cyber Security: User authentication as a use case
CMIT 321 WEEK 2 QUIZ
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Cis 333 Education Organization / snaptutorial.com
[Warsaw 26.06.2018] SDL Threat Modeling principles
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Will future vehicles be secure?
data analysing and recovery using the tool
Endpoint Security for Mobile Devices
Ad

More from sunilkhetpal (20)

PDF
Question 3 Your bank has the following balance sheet Assets .pdf
PDF
Question 3 [12]A large share of the growing expenditure in South.pdf
PDF
Question 26 optionsThe (blank)was used an example of a cartel.pdf
PDF
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdf
PDF
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
PDF
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
PDF
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
PDF
Question 1 Explain the difference between management and leadership.pdf
PDF
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
PDF
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
PDF
Questa Bank is intending to invest in two different investments with.pdf
PDF
Question 1Write a detailed technical report of 5000 words. The au.pdf
PDF
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
PDF
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
PDF
Realice pruebas t de muestras independientes en las puntuaciones de .pdf
PDF
Reading the Discussion section, answer the following (5 marks)a .pdf
PDF
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
PDF
Read the case study given below and answer ALL the questions. What w.pdf
PDF
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
PDF
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
Question 3 Your bank has the following balance sheet Assets .pdf
Question 3 [12]A large share of the growing expenditure in South.pdf
Question 26 optionsThe (blank)was used an example of a cartel.pdf
Question 2.Question 3.Question 4.Question 5. Which of the foll.pdf
Question 2 [1 pt] Variable Wa,b defines that a Wumpus is located as.pdf
Question 1 [10 marks] 1. Create a Customer.mdf database as per dia.pdf
QUESTION 1 PURPOSE Manage expectations and communication across mul.pdf
Question 1 Explain the difference between management and leadership.pdf
Quer�a ayuda con el estudio de caso de Vonkel a continuaci�n para re.pdf
Question 2 (20 Marks) Natasha, Elize and Tino are partners in a well.pdf
Questa Bank is intending to invest in two different investments with.pdf
Question 1Write a detailed technical report of 5000 words. The au.pdf
Reference- Rauber, R. M., Walsh, J. E., & Charlevoix, D. J. (2017). .pdf
Record-a-Song Company, sekiz ark kaydetmek i�in y�kselen bir yldzla .pdf
Realice pruebas t de muestras independientes en las puntuaciones de .pdf
Reading the Discussion section, answer the following (5 marks)a .pdf
Rebecca Wallace is a 26-year-old woman who is brought to the Emergen.pdf
Read the case study given below and answer ALL the questions. What w.pdf
QUESTION 11Sony Safe Harbor has had a broad impact on the interpre.pdf
Read case 6.4, Sparrow v. Demonico. Do you agree with the court�s de.pdf
Ad

Recently uploaded (20)

PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
advance database management system book.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Trump Administration's workforce development strategy
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Introduction to pro and eukaryotes and differences.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
FORM 1 BIOLOGY MIND MAPS and their schemes
Environmental Education MCQ BD2EE - Share Source.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Hazard Identification & Risk Assessment .pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
advance database management system book.pdf
What if we spent less time fighting change, and more time building what’s rig...
Virtual and Augmented Reality in Current Scenario
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
Trump Administration's workforce development strategy
MBA _Common_ 2nd year Syllabus _2021-22_.pdf

Question 1 (1 point)SavedWhich of the following is used to ass.pdf

  • 1. Question 1 (1 point) Saved Which of the following is used to associate a public key with an identity? Question 1 options: Digital hash Digital certificate Digital signature Encryption Question 2 (1 point) Saved Which of the following statements about asymmetric key cryptography is true? Question 2 options: Asymmetric key cryptography is also called private key cryptography. Asymmetric key cryptography uses one shared key.
  • 2. Asymmetric key cryptography is also called public key cryptography. Asymmetric key cryptography uses two keys called public keys. Question 3 (1 point) Saved Which of the following issues and maintains digital certificates? Question 3 options: Registration authority Certification authority Public key infrastructure Client nodes Question 4 (1 point) Saved Which of the following tasks is part of the disposal phase of the SDLC? Question 4 options: Adding hardware and software
  • 3. Authorization Archiving information and sanitization of media Conducting risk assessment Question 5 (1 point) Saved Identification of compliance requirements is done during which of the following phases of the SDLC? Question 5 options: Development/acquisition Implementation/assessment Initiation Operations/maintenance Question 6 (1 point)
  • 4. Which of the following is the most common web application security flaw? Question 6 options: Static data validation Dynamic data validation Failure to validate output Failure to validate input Question 7 (1 point) Saved Which of the following is one of the most popular symmetric algorithms of recent years? Question 7 options: DES AES IPsec
  • 5. RSA Question 8 (1 point) Saved Which of the following statements about symmetric key cryptography is not true? Question 8 options: Symmetric key cryptography uses one shared key. Symmetric algorithms can provide confidentiality. Symmetric key cryptography uses a single secret key. Symmetric algorithms can provide nonrepudiation and authenticity. Question 9 (1 point) Saved Which of the following is the process of creating a numeric value that represents the original text? Question 9 options: Encryption
  • 6. Decryption Hashing Key management Question 10 (1 point) Saved Which of the following provides confidentiality? Question 10 options: Key management Decryption Encryption Hashing Question 11 (1 point) Public key cryptography uses which of the following? Question 11 options:
  • 7. A private key A public key Both a public and a private key A shared key Question 12 (1 point) Which of the following provides a standardized process for all phases of any system development or acquisition effort? Question 12 options: NIST SDLC CIA COTS
  • 8. Question 13 (1 point) Which of the following is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted? Question 13 options: GLBA MITRE NIST OWASP Question 14 (1 point) Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate? Question 14 options: Client nodes Digital certificate
  • 9. Certification authority Registration authority Question 15 (1 point) Which of the following is not a best practice for cryptographic key management? Question 15 options: Keys should be properly destroyed when their lifetime ends. Keys should be transmitted and stored by secure means. Key values should be random, and the full spectrum of the keyspace should be used. Keys should be presented in clear text. Digital hash Digital certificate