0% found this document useful (0 votes)
27 views1 page

Cybersecurity Protocol Quiz

upload-document

Uploaded by

kgeorgis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views1 page

Cybersecurity Protocol Quiz

upload-document

Uploaded by

kgeorgis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Question no 44:

This wireless security protocol allows 192-bit minimum-strength security protocols and
cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and
ECDSA using a 384-bit elliptic curve.

Which is this wireless security protocol?


WPA2-Enterprise

WPA3-Personal

WPA3-Enterprise

WPA2-Personal

Question no 45:

Bella, a security professional working at an IT firm, finds that a security breach has occurred

while transferring important files. Sensitive data, employee usernames, and passwords are

shared in plaintext, paving the way for hackers to perform successful session hijacking. To

address this situation, Bella implemented a protocol that sends data using encryption and

digital certificates.

Which of the following protocols is used by Bella?

FTP

IP

HTTPS

FTPS

Question no 46:

George is a security professional working for iTech Solutions. He was tasked with securely

transferring sensitive data of the organization between industrial systems. In this process,

he used a short-range communication protocol based on the IEEE 203.15.4 standard. This

protocol is used in devices that transfer data infrequently at a low rate in a restricted area,

within a range of 10–100 m.

What is the short-range wireless communication technology George employed in the above

scenario?

LPWAN

You might also like