PREVIOUS QUESTION & ANSWER

Q :
A :

 


QUESTION 1

1.      When you open a web page over HTTP, the HyperText Transfer Protocol, the data on that page is sent in:

 

Secure Sockets Layer (SSL).

 

clear text.

 

binary format.

 

ASCII.

5 points   

QUESTION 2

1.      Which of the following statements is true regarding SSL certificates?

 

They cannot be self-generated.

 

They can be purchased from a trusted third-party certificate authority.

 

They cannot prevent a hacker from replacing the login page of a website with his own page.

 

They cannot provide end-to-end encryption of the web traffic.

5 points   

QUESTION 3

1.      Active tampering and surveillance attacks, as well as passive surveillance attacks, are frequently carried out on:

 

any unencrypted web traffic.

 

digital certificates.

 

SSL certificates that are bound to the Domain Name System (DNS).

 

certificates that are purchased from a trusted third party.

5 points   

QUESTION 4

1.      What can you do if a certificate is not in the Trusted Root Certificate Authorities store?

 

Change the private key.

 

Change the expiration date.

 

Purchase a certificate from a trusted certificate authority.

 

Add your own digital signature to the certificate.

5 points   

QUESTION 5

1.      Self-generated certificates will __________, which will help prevent those with malicious intent from generating a trusted certificate for their own purposes.

 

not be trusted by default

 

be verified by a third party

 

be created by Internet Information Services Manager

 

include the organization’s digital signature

5 points   

QUESTION 6

1.      In the lab, the certificate path indicated that the CA Root certificate was not trusted because it:

 

is not in the Trusted Root Certificate Authorities store.

 

does not have a private key.

 

does not have a public key.

 

was not self-generated.

5 points   

QUESTION 7

1.      Which of the following is unsafe when dealing with sensitive data such as credit cards, banking data, and passwords?

 

Digital certificates

 

Relying on certificates for encrypting the data between client and server

 

An SSL certificate that is bound to the Domain Name System (DNS)

 

Clear text

5 points   

QUESTION 8

1.      What is the root of the certificate created in the lab?

 

IIS

 

TargetLinux01

 

TargetWindows01

 

TargetWindows02

5 points   

QUESTION 9

1.      Which of the following is the primary content of a digital certificate used in SSL?

 

The public key

 

The private key

 

The keyring

 

Binary code

5 points   

QUESTION 10

1.      In the lab, you found that clear text can be read by anyone who intercepts it and is susceptible to:

 

man-in-the-middle attacks.

 

denial-of-service attacks.

 

brute force attacks.

 

fake SSL certificates.

5 points   

QUESTION 11

1.      Which port is used for secure, encrypted HTTPS web traffic?

 

TCP/IP port 21

 

TCP/IP port 22

 

TCP/IP port 80

 

TCP/IP port 443

5 points   

QUESTION 12

1.      Which of the following shows the web server used to generate a certificate?

 

The digital signature

 

The private key

 

The certification path

 

The Secure Socket Layer (SSL)

5 points   

QUESTION 13

1.      The Secure Sockets Layer which relies on __________ for encrypting the data between client and server.

 

digital signatures

 

certificates

 

private keys

 

public keys

5 points   

QUESTION 14

1.      Why did the certificate in this lab’s example result in an error when you visited the website?

 

The certificate was not trusted by default because it was purchased from a third party.

 

The certificate was not trusted by default because it was self-signed.

 

The certificate was not trusted by default because the public key was missing.

 

The certificate was not trusted by default because HTTP was used.

5 points   

QUESTION 15

1.      In order to ensure safe and secure communication between a web server and a client, the server should use:

 

clear text.

 

HTTP, the HyperText Transfer Protocol.

 

HTTPS, the HyperText Transfer Protocol Secure.

 

binary format.

5 points   

QUESTION 16

1.      Which port is used for standard, unencrypted HTTP web traffic?

 

TCP/IP port 21

 

TCP/IP port 22

 

TCP/IP port 80

 

TCP/IP port 443

5 points   

QUESTION 17

1.      In the lab, you used the __________ to create a digital server certificate and bind the certificate to a specific web server.

 

PowerShell

 

The Group Policy Management tool

 

Windows Server Manager

 

Internet Information Services (IIS) Manager

5 points   

QUESTION 18

1.      Which of the following prevents a hacker from replacing the login page of a website with his own page?

 

HTTP

 

clear text

 

An SSL certificate that is bound to the Domain Name System (DNS), or the name of the website

 

A self-generated certificate that is trusted by default

5 points   

QUESTION 19

1.      There is a(n) __________ on all certificates so they will need to be replaced at some point.

 

creation date

 

expiration date

 

default setting

 

temporary keyring

5 points   

QUESTION 20

1.      When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate?

 

A certificate authority will apply its own digital signature to the certificate.

 

A certificate authority will change the setting of the certificate so it is accepted by default.

 

A certificate authority will add its own private key to the certificate.

 

A certificate authority will decrypt the data.

 


Related Questions & Answer

Get Your Solution Free




Get Your Solution Paid




DEMO