CYB3R53C

Cybersecurity Starts Here: Explore, Learn, and Secure Your Operations

Quiz – Understanding VPNs and Why We Use Them

 
QUIZ START

Results

Congratulations you pass !!!

Sorry you have failed the quiz, try again

#1. Which of the following are symmetrical encryption ciphers?

#2. What is another name for a hash that has been encrypted with a private key?

#3. A remote user needs to access the corporate network from hotel room from a laptop. What type of VPN is used for this?

#4. Which standard format is used to request a digital certificate from a CA?

#5. Which of the following could be found in a typical identity certificate?

#6. When obtaining the initial root certificate, what method should be used for validation?

#7. What are the primary responsibilities for a certificate authority (CA)?

#8. Why is the public key in a typical public-private key pair referred to as public?

#9. Which type of VPN technology is likely to be used in a site-to-site VPN?

#10. What algorithms in a VPN provide the confidentiality?

#11. What is the primary difference between a hash and Hashed Message Authentication Code (HMAC)?

#12. Which two of the following are benefits of VPNs?

#13. What is used to encrypt the hash in a digital signature?

#14. What is the key component used to verify a digital signature?

#15. What are valid options to protect data in motion with or without a full VPN?

#16. Which method, when supported by both the client and the CA, is the simple to use when implementing identity certificates on the client?

#17. What is the key component use to create a digital signature?

Previous
Finish