You are on page 1of 4

1/20/24, 12:27 AM Encryption & Decryption - PreQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Cloud & Cloud Security Fundamentals / Encryption & Decryption

Quiz review
Started on Saturday, 20 January 2024, 12:23 AM
State Finished
Completed on Saturday, 20 January 2024, 12:27 AM
Time taken 3 mins 59 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Which technology is commonly used for securing email communication through end-to-end encryption?

SHA-256
PGP (Pretty Good Privacy)
46684
SSL/TLS
X.509

The correct answer is: PGP (Pretty Good Privacy)

Question 2
Correct

Mark 1.00 out of 1.00

46684
What does SSL stand for in the context of secure internet communication?

Stable Security Protocol


Strong Security Link
Secure Socket Layer
Simple Security Layer

The correct answer is: Secure Socket Layer

Question 3
46684
Correct

Mark 1.00 out of 1.00

What is the purpose of a digital signature?

Encrypting data
Verifying the integrity and authenticity of data
Generating random keys
Establishing a secure tunnel

The correct answer is: Verifying the integrity and authenticity of data

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973061&cmid=8074 1/4
1/20/24, 12:27 AM Encryption & Decryption - PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

In a hierarchical trust model, who is at the top of the trust hierarchy?

Application developers
Certificate authorities (CAs)
Network administrators
End users

The correct answer is: Certificate authorities (CAs)

Question 5
Correct

Mark 1.00 out of 1.00

46684
Which cryptographic method uses a pair of keys for encryption and decryption?

Hash functions
Asymmetric cryptography
Quantum cryptography
Symmetric cryptography

The correct answer is: Asymmetric cryptography

Question 6
Correct
46684
Mark 1.00 out of 1.00

What is a characteristic of a decentralized trust model?

Distributes trust across multiple entities


Relies on a single central authority
Ignores encryption algorithms
Requires frequent updates to security policies

46684
The correct answer is: Distributes trust across multiple entities

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973061&cmid=8074 2/4
1/20/24, 12:27 AM Encryption & Decryption - PreQuiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

What does a hash function do in the context of digital signatures?

Encrypts data
Authenticates a user
Establishes a secure connection
Generates a fixed-size hash value

The correct answer is: Generates a fixed-size hash value

Question 8
Correct

Mark 1.00 out of 1.00

46684
What is the initial step in the SSL handshake process?

Session establishment
Cipher negotiation
Key exchange
Certificate exchange

The correct answer is: Certificate exchange

Question 9
Correct
46684
Mark 1.00 out of 1.00

What is the primary purpose of cryptography?

To enhance internet speed


To organize data in databases
To protect information through encryption
To secure physical locations

46684
The correct answer is: To protect information through encryption

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973061&cmid=8074 3/4
1/20/24, 12:27 AM Encryption & Decryption - PreQuiz: Attempt review

Question 10
Correct

Mark 1.00 out of 1.00

Which standard defines the format for public-key certificates, including the X.509 specification?

SHA-256
SSL/TLS
PKCS (Public-Key Cryptography Standards)
PGP (Pretty Good Privacy)

The correct answer is: PKCS (Public-Key Cryptography Standards)

◄ Security Risks & Addressing - PostQuiz

Jump to...
46684 Encryption and Decryption ►

46684

46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973061&cmid=8074 4/4

You might also like