Check answers here:
Modules 21 – 23: Cryptography and Endpoint Protection Group Exam (Answers)
Quiz-summary
0 of 37 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
Information
Modules 21 - 23: Cryptography and Endpoint Protection Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 37 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- Answered
- Review
-
Question 1 of 37
1. Question
1 pointsWhich type of attack does the use of HMACs protect against?Correct
Incorrect
-
Question 2 of 37
2. Question
1 pointsWhich objective of secure communications is achieved by encrypting data?Correct
Incorrect
-
Question 3 of 37
3. Question
1 pointsWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)Correct
Incorrect
-
Question 4 of 37
4. Question
1 pointsA customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required?Correct
Incorrect
-
Question 5 of 37
5. Question
1 pointsWhat is the purpose of a digital certificate?Correct
Incorrect
-
Question 6 of 37
6. Question
1 pointsIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?Correct
Incorrect
-
Question 7 of 37
7. Question
1 pointsWhat is the purpose for using digital signatures for code signing?Correct
Incorrect
-
Question 8 of 37
8. Question
1 pointsWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?Correct
Incorrect
-
Question 9 of 37
9. Question
1 pointsIn addressing a risk that has low potential impact and relatively high cost of mitigation or reduction, which strategy will accept the risk and its consequences?Correct
Incorrect
-
Question 10 of 37
10. Question
1 pointsWhich two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)Correct
Incorrect
-
Question 11 of 37
11. Question
1 pointsMatch the NIST Cybersecurity Framework core function with the description. (Not all options are used.)Correct
Incorrect
-
Question 12 of 37
12. Question
1 pointsA cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base Metric Group Exploitability metric is used to document that the user had to click on the link in order for the attack to occur?Correct
Incorrect
-
Question 13 of 37
13. Question
1 pointsIn network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?Correct
Incorrect
-
Question 14 of 37
14. Question
1 pointsWhat are the three outcomes of the NIST Cybersecurity Framework identify core function? (Choose three.)Correct
Incorrect
-
Question 15 of 37
15. Question
1 pointsWhen a server profile for an organization is being established, which element describes the TCP and UDP daemons and ports that are allowed to be open on the server?Correct
Incorrect
-
Question 16 of 37
16. Question
1 pointsWhat is an action that should be taken in the discovery step of the vulnerability management life cycle?Correct
Incorrect
-
Question 17 of 37
17. Question
1 pointsIn what order are the steps in the vulnerability management life cycle conducted?Correct
Incorrect
-
Question 18 of 37
18. Question
1 pointsWhat does the telemetry function provide in host-based security software?Correct
Incorrect
-
Question 19 of 37
19. Question
1 pointsA security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware?Correct
Incorrect
-
Question 20 of 37
20. Question
1 pointsWhat is a feature of distributed firewalls?Correct
Incorrect
-
Question 21 of 37
21. Question
1 pointsAn administrator suspects polymorphic malware has successfully entered the network past the HIDS system perimeter. The polymorphic malware is, however, successfully identified and isolated. What must the administrator do to create signatures to prevent the file from entering the network again?Correct
Incorrect
-
Question 22 of 37
22. Question
1 pointsOn a Windows host, which tool can be used to create and maintain blacklists and whitelists?Correct
Incorrect
-
Question 23 of 37
23. Question
1 pointsWhat is blacklisting?Correct
Incorrect
-
Question 24 of 37
24. Question
1 pointsWhich technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?Correct
Incorrect
-
Question 25 of 37
25. Question
1 pointsWhich technique could be used by security personnel to analyze a suspicious file in a safe environment?Correct
Incorrect
-
Question 26 of 37
26. Question
1 pointsWhich statement describes the term iptables?Correct
Incorrect
-
Question 27 of 37
27. Question
1 pointsWhat is the difference between an HIDS and a firewall?Correct
Incorrect
-
Question 28 of 37
28. Question
1 pointsWhich statement describes the Cisco Threat Grid Glovebox?Correct
Incorrect
-
Question 29 of 37
29. Question
1 pointsWhich statement describes the policy-based intrusion detection approach?Correct
Incorrect
-
Question 30 of 37
30. Question
1 pointsWhat is the purpose of the DH algorithm?Correct
Incorrect
-
Question 31 of 37
31. Question
1 pointsWhat is a difference between symmetric and asymmetric encryption algorithms?Correct
Incorrect
-
Question 32 of 37
32. Question
1 pointsA company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)Correct
Incorrect
-
Question 33 of 37
33. Question
1 pointsWhich security management plan specifies a component that involves tracking the location and configuration of networked devices and software across an enterprise?Correct
Incorrect
-
Question 34 of 37
34. Question
1 pointsIn addressing an identified risk, which strategy aims to stop performing the activities that create risk?Correct
Incorrect
-
Question 35 of 37
35. Question
1 pointsA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?Correct
Incorrect
-
Question 36 of 37
36. Question
1 pointsMatch the network profile element to the description. (Not all options are used.)Correct
Incorrect
-
Question 37 of 37
37. Question
1 pointsWhich three security services are provided by digital signatures? (Choose three.)Correct
Incorrect