Data Protection with Cryptography Flashcards

1
Q

You need to order an HSM solution for your data center. Which options are available?
Instruction: Choose all options that best answer the question.
Answer Choices

Network-attached appliance

PCIe card

Cloud-based virtual machine

Firmware chip added to server motherboard

A

Network-attached appliance
PCIe card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which VPN protocol is commonly used with IPSec?
Instruction: Choose the option that best answers the question.
Answer Choices

L2TP

SSL

TLS

PPTP

A

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which item is NOT stored in a PKI certificate?
Instruction: Choose the option that best answers the question.
Answer Choices

Expiry date

Subject name

Private key

Public key

A

Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term identifies encrypted data?
Instruction: Choose the option that best answers the question.
Answer Choices

Plain text

Ciphertext

Hash value

Algorithm

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the default listening port number for HTTPS?
Instruction: Choose the option that best answers the question.
Answer Choices

22

80

443

25

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which IPSec configuration enables encrypted packet payload?
Instruction: Choose the option that best answers the question.
Answer Choices

ESP

SLA

AH

CIA

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Microsoft PowerShell cmdlet is used to generate a file hash?
Instruction: Choose the option that best answers the question.
Answer Choices

Set-FileHash

Add-FileHash

New-FileHash

Get-FileHash

A

Get-FileHash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You would like to only boot the OS on a host from trusted OS files. What is required to do this?
Instruction: Choose all options that best answer the question.
Answer Choices

BIOS with secure boot enabled

TPM

HSM

UEFI with secure boot enabled

A

TPM
UEFI with secure boot enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing applies to which aspect of the CIA security triad?
Instruction: Choose the option that best answers the question.
Answer Choices

Integrity

Availability

Authentication

Confidentiality

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which PKI standards are used for revoked certificates?
Instruction: Choose all options that best answer the question.
Answer Choices

ESP

OCSP

SLA

CRL

A

OCSP
CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly