Digital certificates often use the _______ format, which includes the certificate's public key and information about the key owner.

  • DER (Distinguished Encoding Rules)
  • PEM (Privacy Enhanced Mail)
  • PGP (Pretty Good Privacy)
  • SSL (Secure Sockets Layer)
Digital certificates often use the PEM (Privacy Enhanced Mail) format. This format typically includes the certificate's public key and information about the key owner. PEM is widely used for securing data through encryption and authentication processes, making it an essential part of secure communications.

Which part of a digital signature process involves generating a value that is unique to the signed data?

  • Digital Certificate
  • Hashing
  • Private Key Decryption
  • Public Key Encryption
In the digital signature process, a unique hash value is generated from the data to be signed. This hash value is then encrypted with the sender's private key to create the digital signature. The recipient can use the sender's public key to verify the signature and the integrity of the data.

Digital certificates are issued by trusted third parties called what?

  • Certificate Authorities
  • Domain Registrars
  • Internet Service Providers
  • Social Media Companies
Digital certificates are issued by trusted third parties known as Certificate Authorities (CAs). These entities validate the identity of individuals, organizations, or websites and issue digital certificates, which are used to establish trust and enable secure communication on the internet.

What encryption technique involves two interdependent cryptographic keys, one public and one private?

  • AES
  • DES
  • RSA
  • SSL
RSA (Rivest-Shamir-Adleman) is an encryption technique that uses two interdependent cryptographic keys, a public key for encryption and a private key for decryption. This method ensures secure communication and data protection.

To ensure that the browser enforces the CSP but does not block or report any content, the _______ directive is used.

  • allow-all
  • default-src
  • enforce
  • report-only
To ensure that the browser enforces the Content Security Policy (CSP) but only reports violations without blocking content, the report-only directive is used. This is useful for monitoring policy violations without impacting user experience.

An organization's proactive approach to anticipate and respond to future security incidents is termed as _______ management.

  • Incident
  • Risk
  • Security
  • Vulnerability
The correct answer is "Risk Management." It encompasses identifying potential security threats, assessing their impact, and implementing strategies to mitigate them.

In which type of attack does an attacker trick a victim into submitting a malicious request on their behalf?

  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • Distributed Denial of Service (DDoS)
  • Man-in-the-Middle (MitM)
Cross-Site Request Forgery (CSRF) is an attack in which the attacker tricks a victim into submitting a malicious request, often without the victim's knowledge, on their behalf.

The process of converting data into a code to prevent unauthorized access is known as _______.

  • Authentication
  • Encryption
  • Firewall
  • Hacking
Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that even if unauthorized users gain access to the data, they cannot read or use it without the decryption key. Encryption is crucial for data security and privacy.

In file system security, what restricts or allows specific actions (like reading, writing, executing) on a file or a directory?

  • ACL
  • BIOS
  • Firewall
  • SMTP
Access Control Lists (ACLs) are used to restrict or allow specific actions on files or directories. They define who can access the file or directory, what actions they can perform (e.g., read, write, execute), and under what conditions they can do so.

In a VPN, what is the role of a "tunneling protocol"?

  • It encrypts data in transit
  • It establishes connections
  • It manages user authentication
  • It routes traffic to external servers
A "tunneling protocol" plays a crucial role in VPNs by encapsulating data in a secure "tunnel," encrypting it, and ensuring safe transit through untrusted networks.