Module quiz: Cryptography Quiz Answers
In this article i am gone to share Coursera Course: Cybersecurity Threat Vectors and Mitigation by Microsoft Week 2 | Module quiz: Cryptography Quiz Answers with you..
Enrol Link: Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation by Microsoft Week 2 Quiz Answers
Module quiz: Cryptography Quiz Answers
Question 1)
Sam wants to securely communicate with a new supplier, but they haven’t agreed on a shared key beforehand. Which type of encryption should they use?
- Caesar Cipher
- Symmetric encryption
- Asymmetric encryption
Question 2)
The Data Encryption Standard (DES) is a less secure encryption algorithm than the Advanced Encryption Standard (AES).
- True
- False
Question 3)
True or False: VeraCrypt and TrueCrypt are encryption tools that are used to encrypt entire hard drives, and they do not have the functionality to encrypt individual files or folders.
- True
- False
Question 4)
Ashley and Tim are communicating over an insecure network. They want to establish a shared secret key without exposing it to potential eavesdroppers. Which asymmetric key encryption algorithm should they primarily consider for this purpose?
- Elliptic curve cryptography.
- RSA algorithm.
- Diffie-Hellman algorithm.
Question 5)
A company stores user passwords in plaintext in their database. After a data breach, the company decides to enhance the security of their password storage. Which technique should they implement to ensure that even if two users have the same password, their hashes stored in the database will be different?
- Implementing the MD5 hashing algorithm.
- Implementing salting before hashing.
- Implementing SHA-256 hashing algorithm.
Question 6)
What is the primary purpose of Digital signing?
- To encrypt messages for secure communication.
- To authenticate digital documents or messages and ensure their integrity by using cryptographic techniques such as RSA and ECDSA.
- To compress files for storage.
Question 7)
True or False: SSL certificates are used exclusively for securing web transactions on e-commerce websites.
- True
- False
Question 8)
Signed URLs can only be used for secure file sharing and cannot be used for controlling access to API endpoints.
- True
- False
Question 9)
A centralized authentication and authorization system can enhance security, improve efficiency, ensure consistency, and allow for better scalability.
- True
- False
Question 10)
Acme Corporation is looking for an authentication and authorization protocol to allow their users to log in once and gain access to multiple systems, applications, or services without having to log in again. Which protocol should Acme Corporation consider using?
- OAuth
- SAML (Security Assertion Markup Language)
- OpenID Connect
Question 11)
Which of the following encryption techniques did Julius Caesar use to communicate with his generals?
- Symmetric Encryption
- Asymmetric Encryption
- Caesar Cipher
Question 12)
What is the Advanced Encryption Standard (AES), and how does it secure data transmission?
- AES is an outdated encryption standard that was replaced by RSA.
- AES is an asymmetric encryption algorithm that uses two different keys to encrypt and decrypt data.
- AES is a symmetric encryption algorithm that encrypts data in blocks and uses the same key for both encryption and decryption.
Question 13)
Which encryption tool uses a combination of symmetric and asymmetric encryption to secure email communication and can also be used to encrypt files and folders?
- Bitlocker
- VPN
- PGP (Pretty Good Privacy)
Question 14)
Which hashing algorithm is considered highly secure against collision attacks and is widely adopted for applications that require high levels of security?
- MD5
- Salting
- SHA-256
Question 15)
An online retailer wants to ensure the integrity of electronic invoices and receipts sent to customers and to protect consumers from counterfeit products or fraudulent transactions. Which technology should the retailer employ?
- Digital signatures
- Public key encryption
- File compression
Question 16)
Alice receives an email from her bank asking her to log in to her account to verify her information. She is concerned about phishing and wants to ensure the email is genuinely from her bank. What should she check to verify the authenticity of the email sender?
- Check if the email is digitally signed using a certificate.
- Check if the email contains a link to the bank’s website.
- Check for spelling errors in the email.
Question 17)
What is the primary difference between authentication and authorization in the context of access control?
- Authentication and authorization are synonymous and have no difference.
- Authentication is verifying the identity of a user, while authorization determines what actions or resources an authenticated user can access.
- Authentication allows users to perform actions within a system, while authorization verifies the identity of users.
Question 18)
Which centralized authentication system uses secret-key cryptography and involves an exchange with an Authentication Server (AS) and a Ticket-Granting Service (TGS)?
- Kerberos
- RADIUS
- OAuth
Question 19)
The RSA algorithm is based on the mathematical properties of even numbers.
- True
- False
Question 20)
Digital signatures are the same as digital certificates, and they are used for encrypting communication.
- True
- False
Question 21)
Which of the following statements correctly describes the role of Certificate Authorities (CAs) in the context of digital certificates?
- Certificate Authorities (CAs) are responsible for encrypting data transmitted over the internet.
- Certificate Authorities (CAs) are trusted organizations that validate and issue digital certificates, ensuring the authenticity of the certificate holder’s identity.
- Certificate Authorities (CAs) are databases that store sensitive information for websites and services.
Question 22)
Sam has opened multiple branches and is finding it difficult to manage access controls for each branch individually. Which solution should she adopt to manage access controls more efficiently across all branches?
- She should disregard access controls to save time and effort.
- She should assign a manager at each branch to handle access controls individually.
- She should implement a centralized authentication and authorization system to manage access controls from a single location.
Question 23)
Asymmetric encryption uses a shared secret key to encrypt and decrypt data.
- True
- False
Question 24)
The Data Encryption Standard (DES) is a less secure encryption algorithm than the Advanced Encryption Standard (AES).
- True
- False
Question 25)
Sam’s Scoops stores customer data. Sam wants to ensure that only authorized parties can access this data, even if someone has physical access to the company’s computers. Which encryption tool should Sam use to encrypt the entire hard drive of the business’ computers, including the operating system and all user data?
- PGP (Pretty Good Privacy)
- VPN (Virtual Private Network)
- Bitlocker or FileVault
Question 26)
Salting involves adding a random value to a password before hashing, and this makes it harder for attackers to use precomputed hash tables to crack passwords.
- True
- False
Question 27)
John is a software developer who needs to provide temporary access to a confidential document for his client. He wants to make sure that only his client can access the document and that the access expires after 24 hours. Which technique should John use to achieve this?
- Upload the document to a public cloud storage service.
- Generate a signed URL with an expiration time of 24 hours and share it with the client.
- Share the document via email.
Question 28)
Sam wants to ensure that the online transactions made by customers on the business website are secure. Which encryption protocol should Sam use to secure communication between the web server and the client’s browser?
- SSL/TLS
- Advanced Encryption Standard (AES)
- RSA encryption
Question 29)
What is the primary purpose of using public key encryption?
- To compress data for faster transmission.
- To securely transmit data over unsecured networks using a pair of keys, one public and one private.
- To hide the existence of data transmission.
Question 30)
What is one of the key benefits of using signed URLs?
- Sharing the secret key with the end user for transparency.
- Increased security by requiring a valid signature to access protected resources.
- Allowing unlimited access to the resources for all users.
Question 31)
Microsoft’s Identity Platform, as an IDaaS, does not support single sign-on (SSO) which allows users to authenticate once and gain access to multiple applications and resources.
- True
- False