CHAPTER 4 ASSESSMENT

  1.   1. Which of the following is the strongest reason why operating system access controls are insufficient to secure objects?

    1. It’s possible to boot into another operating system and format the disk.

    2. Strong passwords longer that 24 characters are not common.

    3. It’s possible to boot into another operating system and bypass access controls.

    4. It is often possible to find a user’s password written down.

  2.   2. What piece of information is necessary to encrypt and decrypt data?

    1. Key

    2. Salt

    3. TPM

    4. Recovery agent

  3.   3. Which Windows feature allows you to encrypt entire volumes?

    1. EFS

    2. Veracrypt

    3. BitLocker

    4. AppLocker

  4.   4. Which Windows feature uses keys based on a user’s password?

    1. EFS

    2. Veracrypt

    3. BitLocker

    4. AppLocker

  5.   5. Where does BitLocker store encryption keys for transparent mode?

    1. USB key

    2. Recovery file

    3. EFS

    4. TPM

  6.   6. Which operating system does not have BitLocker enabled by default?

    1. Windows Server 2019

    2. Windows XP

    3. Windows 10 Professional

    4. Windows 10 Home

  7.   7. Which of the following services does communication encryption not provide?

    1. Confidentiality

    2. Nonrepudiation

    3. Integrity

    4. Availability

  8.   8. Which protocol commonly provides a secure channel for HTTPS?

    1. TLS/SSL

    2. PPTP

    3. S-PPTP

    4. L2TP

  9.   9. Which VPN protocol has the fewest issues with NATs and firewalls?

    1. L2TP

    2. SSTP

    3. IPSec

    4. PPTP

  10. 10. Which of the following is the weakest wireless protocol (and should never be used)?

    1. WPA

    2. PSK

    3. WEP

    4. SSID

  11. 11. Which type of encryption algorithm uses two related keys?

    1. Symmetric

    2. Balanced

    3. Private

    4. Asymmetric

  12. 12. Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?

    1. Digital signature

    2. Digital certificate

    3. Certificate authority

    4. Private key

  13. 13. What is a general approach for handling keys using trusted entities and digital certificates?

    1. PKI

    2. IPSec

    3. WPA-PSK

    4. SSTP

  14. 14. Which common folder should be encrypted for all users?

    1. Windows

    2. Program Files

    3. My Documents

    4. My Secure Files

  15. 15. Why is it recommended to encrypt folders instead of files?

    1. Individual files are written to disk unencrypted before being encrypted.

    2. Folder encryption is faster.

    3. Folder encryption results in less disk usage.

    4. Individual files are encrypted first and then written to disk.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.109.34