Q: 1
Which of the following algorithms is an iterated block cipher that works by repeating the defined
steps multiple times and has a 128-bit block size, having key sizes of 128, 192, and 256 bits?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Peter, a network defender, was instructed to protect the corporate network from unauthorized
access. To achieve this, he employed a security solution for wireless communication that uses
dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects
the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in
the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Ben, a computer user, applied for a digital certificate. A component of PKI verifies Ben's identity
using the credentials provided and passes that request on behalf of Ben to grant the digital
certificate.
Which of the following PKI components verified Ben as being legitimate to receive the certificate?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which of the following types of network traffic flow does not provide encryption in the data transfer
process, and the data transfer between the sender and receiver is in plain text?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Below is the list of encryption modes used in a wireless network.
1.WPA2 Enterprise with RADIUS
2.WPA3
3.WPA2 PSK
4.WPA2 Enterprise
Identify the correct order of wireless encryption modes in terms of security from high to low.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Identify the backup mechanism that is performed within the organization using external devices such
as hard disks and requires human interaction to perform the backup operations, thus, making it
suspectable to theft or natural disasters.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Identify the loT communication model that serves as an analyzer for a company to track monthly or
yearly energy consumption. Using this analysis, companies can reduce the expenditure on energy.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Identify the UBA tool that collects user activity details from multiple sources and uses artificial
intelligence and machine learning algorithms to perform user behavior analysis to prevent and
detect various threats before the fraud is perpetrated.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following access control models refers to assigning permissions to a user role based on
the rules defined for each user role by the administrator?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Fernandez, a computer user, initiated an action to access a file located on a remote server. In this
process, his account went through certain security constraints to check for any restrictions on his
account with regard to access to the file.
Which of the following terms is referred to as a file in the above scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2