Question 1 (1 point)
Saved
Which of the following is used to associate a public key with an identity?
Question 1 options:
Digital hash
Digital certificate
Digital signature
Encryption
Question 2 (1 point)
Saved
Which of the following statements about asymmetric key cryptography is true?
Question 2 options:
Asymmetric key cryptography is also called private key cryptography.
Asymmetric key cryptography uses one shared key.
Asymmetric key cryptography is also called public key cryptography.
Asymmetric key cryptography uses two keys called public keys.
Question 3 (1 point)
Saved
Which of the following issues and maintains digital certificates?
Question 3 options:
Registration authority
Certification authority
Public key infrastructure
Client nodes
Question 4 (1 point)
Saved
Which of the following tasks is part of the disposal phase of the SDLC?
Question 4 options:
Adding hardware and software
Authorization
Archiving information and sanitization of media
Conducting risk assessment
Question 5 (1 point)
Saved
Identification of compliance requirements is done during which of the following phases of the
SDLC?
Question 5 options:
Development/acquisition
Implementation/assessment
Initiation
Operations/maintenance
Question 6 (1 point)
Which of the following is the most common web application security flaw?
Question 6 options:
Static data validation
Dynamic data validation
Failure to validate output
Failure to validate input
Question 7 (1 point)
Saved
Which of the following is one of the most popular symmetric algorithms of recent years?
Question 7 options:
DES
AES
IPsec
RSA
Question 8 (1 point)
Saved
Which of the following statements about symmetric key cryptography is not true?
Question 8 options:
Symmetric key cryptography uses one shared key.
Symmetric algorithms can provide confidentiality.
Symmetric key cryptography uses a single secret key.
Symmetric algorithms can provide nonrepudiation and authenticity.
Question 9 (1 point)
Saved
Which of the following is the process of creating a numeric value that represents the original
text?
Question 9 options:
Encryption
Decryption
Hashing
Key management
Question 10 (1 point)
Saved
Which of the following provides confidentiality?
Question 10 options:
Key management
Decryption
Encryption
Hashing
Question 11 (1 point)
Public key cryptography uses which of the following?
Question 11 options:
A private key
A public key
Both a public and a private key
A shared key
Question 12 (1 point)
Which of the following provides a standardized process for all phases of any system
development or acquisition effort?
Question 12 options:
NIST
SDLC
CIA
COTS
Question 13 (1 point)
Which of the following is an open community dedicated to enabling organizations to develop,
purchase, and maintain applications that can be trusted?
Question 13 options:
GLBA
MITRE
NIST
OWASP
Question 14 (1 point)
Which of the following components of PKI performs the administrative functions, including
verifying the identity of users and organizations r.
Question 1 (1 point)SavedWhich of the following is used to ass.pdf
1. Question 1 (1 point)
Saved
Which of the following is used to associate a public key with an identity?
Question 1 options:
Digital hash
Digital certificate
Digital signature
Encryption
Question 2 (1 point)
Saved
Which of the following statements about asymmetric key cryptography is true?
Question 2 options:
Asymmetric key cryptography is also called private key cryptography.
Asymmetric key cryptography uses one shared key.
2. Asymmetric key cryptography is also called public key cryptography.
Asymmetric key cryptography uses two keys called public keys.
Question 3 (1 point)
Saved
Which of the following issues and maintains digital certificates?
Question 3 options:
Registration authority
Certification authority
Public key infrastructure
Client nodes
Question 4 (1 point)
Saved
Which of the following tasks is part of the disposal phase of the SDLC?
Question 4 options:
Adding hardware and software
3. Authorization
Archiving information and sanitization of media
Conducting risk assessment
Question 5 (1 point)
Saved
Identification of compliance requirements is done during which of the following phases of the
SDLC?
Question 5 options:
Development/acquisition
Implementation/assessment
Initiation
Operations/maintenance
Question 6 (1 point)
4. Which of the following is the most common web application security flaw?
Question 6 options:
Static data validation
Dynamic data validation
Failure to validate output
Failure to validate input
Question 7 (1 point)
Saved
Which of the following is one of the most popular symmetric algorithms of recent years?
Question 7 options:
DES
AES
IPsec
5. RSA
Question 8 (1 point)
Saved
Which of the following statements about symmetric key cryptography is not true?
Question 8 options:
Symmetric key cryptography uses one shared key.
Symmetric algorithms can provide confidentiality.
Symmetric key cryptography uses a single secret key.
Symmetric algorithms can provide nonrepudiation and authenticity.
Question 9 (1 point)
Saved
Which of the following is the process of creating a numeric value that represents the original
text?
Question 9 options:
Encryption
6. Decryption
Hashing
Key management
Question 10 (1 point)
Saved
Which of the following provides confidentiality?
Question 10 options:
Key management
Decryption
Encryption
Hashing
Question 11 (1 point)
Public key cryptography uses which of the following?
Question 11 options:
7. A private key
A public key
Both a public and a private key
A shared key
Question 12 (1 point)
Which of the following provides a standardized process for all phases of any system
development or acquisition effort?
Question 12 options:
NIST
SDLC
CIA
COTS
8. Question 13 (1 point)
Which of the following is an open community dedicated to enabling organizations to develop,
purchase, and maintain applications that can be trusted?
Question 13 options:
GLBA
MITRE
NIST
OWASP
Question 14 (1 point)
Which of the following components of PKI performs the administrative functions, including
verifying the identity of users and organizations requesting a digital certificate?
Question 14 options:
Client nodes
Digital certificate
9. Certification authority
Registration authority
Question 15 (1 point)
Which of the following is not a best practice for cryptographic key management?
Question 15 options:
Keys should be properly destroyed when their lifetime ends.
Keys should be transmitted and stored by secure means.
Key values should be random, and the full spectrum of the keyspace should be used.
Keys should be presented in clear text.
Digital hash
Digital certificate