Q: 11
Jamie wants to send a confidential file to her friend Alice. For this purpose, they installed an
application for securely sharing the file. The application employs an encryption algorithm that uses
the same shared secret key for encryption and decryption of data.
Identify the type of cryptography employed by the application used by Alice and Jamie for file
sharing.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Below are the various steps involved in establishing a network connection using the shared key
authentication process.
1.The AP sends a challenge text to the station.
2.The station connects to the network.
3.The station encrypts the challenge text using its configured 128-bit key and sends the encrypted
text to the AP.
4.The station sends an authentication frame to the AP.
5.The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original
challenge text.
What is the correct sequence of steps involved in establishing a network connection using the shared
key authentication process?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
George, a certified security professional, was hired by an organization to ensure that the server
accurately responds to customer requests. In this process, George employed a security solution to
monitor the network traffic toward the server. While monitoring the traffic, he identified attack
signatures such as SYN flood and ping of death attempts on the server.
Which of the following categories of suspicious traffic signature has George identified in the above
scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Which of the following layers of loT architecture employs protocols and networks for connecting,
sending, and receiving data between devices and network?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Kevin logged into a banking application with his registered credentials and tried to transfer some
amount from his account to Flora's account. Before transferring the amount to Flora's account, the
application sent an OTP to Kevin's mobile for confirmation.
Which of the following authentication mechanisms is employed by the banking application in the
above scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2