IA100B Skills Check
Skills Check Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
-
Not categorized
0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
-
Current -
Review -
Answered -
Correct -
Incorrect
-
Question 1 of 10
1. Question
Which of the following is NOT a benefit organizations gain from utilizing identity management systems?
-
-
Question 2 of 10
2. Question
Any process by which a system verifies the identity of a user who wishes to access it.
-
-
Question 3 of 10
3. Question
Which of the following is NOT an example of two-factor authentication?
-
-
Question 4 of 10
4. Question
Which access control model is based on “Labels” for access?
-
-
Question 5 of 10
5. Question
Which of the following uses an asymmetric key specifically for digital certificates?
-
-
Question 6 of 10
6. Question
Which of the following is a stream cipher?
-
-
Question 7 of 10
7. Question
How many bits do stream ciphers encrypt at a time?
-
-
Question 8 of 10
8. Question
Block Ciphers encrypt one byte at a time.
-
-
Question 9 of 10
9. Question
Which method was one of the earliest and is considered a foundational concept in public-key cryptography?
-
-
Question 10 of 10
10. Question
The RSA algorithm uses _______ cryptography.
-