QUIZ START
#1. Which of the following are symmetrical encryption ciphers?
#2. What is another name for a hash that has been encrypted with a private key?
#3. A remote user needs to access the corporate network from hotel room from a laptop. What type of VPN is used for this?
#4. Which standard format is used to request a digital certificate from a CA?
#5. Which of the following could be found in a typical identity certificate?
#6. When obtaining the initial root certificate, what method should be used for validation?
#7. What are the primary responsibilities for a certificate authority (CA)?
#8. Why is the public key in a typical public-private key pair referred to as public?
#9. Which type of VPN technology is likely to be used in a site-to-site VPN?
#10. What algorithms in a VPN provide the confidentiality?
#11. What is the primary difference between a hash and Hashed Message Authentication Code (HMAC)?
#12. Which two of the following are benefits of VPNs?
#13. What is used to encrypt the hash in a digital signature?
#14. What is the key component used to verify a digital signature?
#15. What are valid options to protect data in motion with or without a full VPN?
#16. Which method, when supported by both the client and the CA, is the simple to use when implementing identity certificates on the client?
#17. What is the key component use to create a digital signature?
Previous
Finish