QUIZ START
#1. What is the key component used to verify a digital signature?
#2. Which two of the following are benefits of VPNs?
#3. A remote user needs to access the corporate network from hotel room from a laptop. What type of VPN is used for this?
#4. Which standard format is used to request a digital certificate from a CA?
#5. What are the primary responsibilities for a certificate authority (CA)?
#6. Which type of VPN technology is likely to be used in a site-to-site VPN?
#7. What is the key component use to create a digital signature?
#8. Which method, when supported by both the client and the CA, is the simple to use when implementing identity certificates on the client?
#9. What are valid options to protect data in motion with or without a full VPN?
#10. What algorithms in a VPN provide the confidentiality?
#11. What is used to encrypt the hash in a digital signature?
#12. Which of the following are symmetrical encryption ciphers?
#13. Which of the following could be found in a typical identity certificate?
#14. Why is the public key in a typical public-private key pair referred to as public?
#15. When obtaining the initial root certificate, what method should be used for validation?
#16. What is another name for a hash that has been encrypted with a private key?
#17. What is the primary difference between a hash and Hashed Message Authentication Code (HMAC)?
Previous
Finish