Sy0-501 Security + Practice Test

Saída

Questão 1 of 1

  Tempo Restante


0 [{"id":417164,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:25:52","updated_at":"2018-04-12 16:02:50","questionName":"What are the features of Elliptic Curve Cryptography (ECC)? (Select TWO) ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":47,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417168,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:26:42","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following solutions would be the fastest in validating digital certificates? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":49,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417177,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:29:04","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following would MOST likely appear in an uncredentialed vulnerability scan? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":55,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417165,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:26:23","updated_at":"2018-04-12 16:02:50","questionName":"Advanced Encryption Standard (Select THREE) ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":48,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417172,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:28:06","updated_at":"2018-04-12 16:02:50","questionName":"A system requires digital certificate information to be entered into a form textbox in Base64 encoded format. Which of the following certificate formats should be used to obtain the information in this required format? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":52,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417174,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:28:26","updated_at":"2018-04-12 16:02:50","questionName":"Two users need to send each other emails over an unsecured network. The system should support the principle of non-repudiation. Which of the following should be used to sign each user\u2019s certificate? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":53,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417169,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:27:06","updated_at":"2018-04-12 16:02:50","questionName":"What is the name of a storage solution used to retain copies of private encryption keys? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":50,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417171,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:27:47","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following cryptographic attacks would password salts render ineffective? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":51,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417178,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:29:24","updated_at":"2018-04-12 16:02:50","questionName":"In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":56,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417183,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:30:30","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following cryptographic algorithms is irreversible? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":59,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417175,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:28:44","updated_at":"2018-04-12 16:02:50","questionName":"An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":54,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417271,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following security controls does an iris scanner provide? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":45,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417182,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:30:09","updated_at":"2018-04-12 16:02:50","questionName":"An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend in lieu of an OCSP? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":58,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417180,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 11:29:52","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following AES modes of operation provide authentication? (Select TWO).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":57,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417272,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following technologies employ the use of SAML? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":46,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
417164
0
120
block

What are the features of Elliptic Curve Cryptography (ECC)? (Select TWO)

Selecione as respostas corretas  

(0/0)














417168
0
120
none
417177
0
120
none
417165
0
120
none
417172
0
120
none
417174
0
120
none
417169
0
120
none
417171
0
120
none
417178
0
120
none
417183
0
120
none
417175
0
120
none
417271
0
60
none
417182
0
120
none
417180
0
120
none
417272
0
60
none