Time limit: 0
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
Which of the following Public key infrastructure (PKI) terms is known as an organization that acts to validate the identities of entities (such as websites, email addresses, companies, or individual persons) and bind them to cryptographic keys through the issuance of electronic documents known as digital certificates?
CorrectIncorrect -
Question 2 of 15
2. Question
Assuming you have the domain yourcompany.com with the following sub-domains:
www.yourcompany.com
mail.yourcompany.com
intranet.yourcompany.com
secure.yourcompany.com
me.yourcompany.comWhich of the following types of certificates will you choose to secure all the first-level sub-domains on a single domain name?
CorrectIncorrect -
Question 3 of 15
3. Question
In the form of Role-Based Access Control, data are accessible or not accessible based on the user’s IP address.
CorrectIncorrect -
Question 4 of 15
4. Question
In the form of Rule-Based Access Control, data are accessible or not accessible based on the user’s IP address.
CorrectIncorrect -
Question 5 of 15
5. Question
Which of the following types of certificates will you use to digitally sign your apps as a way for end-users to verify that the code they receive has not been altered or compromised by a third party?
CorrectIncorrect -
Question 6 of 15
6. Question
A _____________ certificate is a digital certificate that’s not signed by a publicly trusted certificate authority (CA). These certificates are created, issued, and signed by the company or developer who is responsible for the website or software being signed.
CorrectIncorrect -
Question 7 of 15
7. Question
Which of the following authentication protocols allows you to use an existing account to sign in to multiple websites, without needing to create new passwords?
CorrectIncorrect -
Question 8 of 15
8. Question
Answer the fill-in-the-blank by typing one of the following types of authentication:
Security
Single
Sign
Service
-
Assertions Markup Language is an important component of many SSO systems that allow users to access multiple applications, services, or websites from a single login process. It is used to share security credentials across one or more networked systems.
CorrectIncorrect -
-
Question 9 of 15
9. Question
In cloud computing, the ability to scale up and down resources based on the user’s needs is known as:
CorrectIncorrect -
Question 10 of 15
10. Question
You have been tasked to configure the Wi-Fi of your company’s LAN to allow certain workstations to have access to the Internet and the rest to be blocked.
Which of the following security technology will you implement to meet the requirement?
CorrectIncorrect -
Question 11 of 15
11. Question
You have been tasked to implement a security solution so all the network events from your company should be recorded in a central database for further analysis.
Which of the following security solutions will you implement to meet the requirement?
CorrectIncorrect -
Question 12 of 15
12. Question
WiFi ____________ Setup is a wireless network security standard that tries to make connections between a router and wireless devices faster, easier, and more secure.
CorrectIncorrect -
Question 13 of 15
13. Question
What technique is used for IP address conservation by making private IP addresses to connect to the Internet?
CorrectIncorrect -
Question 14 of 15
14. Question
Answer the fill-in-the-blank by typing one of the following words:
Security
Filter
Control
Service
-
Access List is a network traffic filter that controls incoming or outgoing traffic. It works on a set of rules that define how to forward or block a packet at the router’s interface.
CorrectIncorrect -
-
Question 15 of 15
15. Question
Which of the following VPN solutions is used to connect a personal user device to a remote server on a private network?
CorrectIncorrect