Security

Is this your test? Login to manage it. If not, you can develop an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A digital certificate that turns the address bar green is a(n) ________.
2.
1 point
Searching for wireless signals from an automobile or on foot suing a portable computing device.
3.
1 point
Which of the following is NOT a field of an X.509 certificate?
4.
1 point
Proving that a user sent an e-mail message is known as ______
5.
1 point
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________.
6.
1 point
An attack that sends unsolicited messages to Bluetooth-enabled devices.
7.
1 point
The encryption protocol standard for WPA2.
8.
1 point
Digital certificates that are split into two parts are known as _____ certificates.
9.
1 point
A digital signature is ______
10.
1 point
If the root CA is compromised, then all certificates issued by the root CA or any
subordinate can be considered invalid.
11.
1 point
Digital certificates can be used for each of the following except ________
12.
1 point
A 24-bit value used in WEP that changes each time a packet is encrypted.
13.
1 point
Which of the following asymmetric cryptographic algorithms is the most
secure?
14.
1 point
The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters.
15.
1 point
Symmetric cryptographic algorithms are also called ______.
16.
1 point
A digital certificate associates ________.
17.
1 point
An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead.
18.
1 point
The data added to a section of text when using the Message Digest (MD)
algorithm is called ______.
19.
1 point
The transmission of the SSID from the access point to wireless devices.
20.
1 point
_____ refers to a situation in which keys are managed by a third-party, such as a trusted CA.
21.
1 point
Which of the following are functions provided by a digital signature? (Choose all that apply).
22.
1 point
A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software.
23.
1 point
An EAP method designed to simplify the deployment of 802.11x by using Microsoft Windows logins and passwords.
24.
1 point
A key value that must be created and entered into both the access point and all wireless devices ("shared") prior to ("pre") the devices communicating with the AP.
25.
1 point
Each of the following is an example of how hashing is used except ______.
26.
1 point
Which of the following is the strongest symmetric cryptographic algorithm?
27.
2 points
A(n) _____ is never intended to be decrypted but is only used for comparison
purposes (Select all possible answers).
28.
1 point
A WPA encryption technology.
29.
1 point
A list of approved digital certificates is called a(n) ________.
30.
1 point
Which of the following asymmetric cryptographic algorithms is the most
secure?
31.
1 point
The Microsoft Windows BitLocker whole disk encryption cryptography
technology can protect each of the following except ______.
32.
1 point
A method for controlling access to a WLAN based on the device's MAC address.
33.
1 point
In order to ensure a secure cryptographic connection between a Web browser and a Web server a _____ digital certificate would be used.
34.
1 point
When Bob wants to send a secure message to Alice using an asymmetric
cryptographic algorithm, which key does he use to encrypt the message?
35.
1 point
A method of determining the keystream by analyzing two packets that were created from the same initialization vector (IV).
36.
1 point
Which of the following is NOT a characteristic of a secure hash algorithm?
37.
1 point
The original set of protections from the Wi-Fi Alliance in 2003 designed to protect both present and future wireless devices.
38.
1 point
An entity that issues digital certificates for others is a(n) ________.
39.
1 point
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings.
40.
1 point
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
41.
1 point
Which of the following is a protection provided by hashing?
42.
1 point
The process of documenting and then advertising the location of wireless LANs for others to use. Wireless networks were identified by drawing on sidewalks or walls around the area of the network.
43.
1 point
Public key infrastructure (PKI) ________.
44.
1 point
Data that is to be encrypted by inputting into an algorithm is called
45.
1 point
A digital signature can provide each of the following benefits except ______.
46.
1 point
A framework for transporting authentication protocols that defines the format of the messages.
47.
1 point
_____ uses the Windows NTFS file system to automatically encrypt all files.
48.
1 point
Keys can be stored in each of the following except ________.
49.
1 point
Each of the following is a basic security protection over information that
cryptography can provide except ______.
50.
1 point
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its user to attacks.