CNL_CH_2
問題一覧
1
Revoke the code-signing certificate.
2
High data entropy
3
0
4
the sender's private key and decrypted with the sender's public key
5
To validate the integrity of the files
6
Generate a CSR (Certificate Signing Request)
7
3DES, RC4
8
Check the hash of the installation file
9
Calculate the checksum using a hashing algorithm
10
PKI
11
Wildcard
12
Hashing
13
Using a SHA-2 signature of a drive image
14
Non-repudiation
15
Tokenizing the credit cards in the database
16
User certificate
17
The identity federation protocol, The encryption method
18
Steganography
19
SSH key
20
Data at rest
21
Brute-force
22
Salting
23
Weak encryption
24
Revoke the code signing certificate used by both programs.
25
Implement salting and hashing
26
The required intermediate certificate is not loaded as part of the certificate chain.
27
The public ledger
28
Weak credentials
29
A decryption certificate
30
DNSSEC
31
Data encryption
32
TLS
33
Implement password salting
34
Search for matching file hashes on malware websites
35
A dictionary attack
36
Password spraying
37
Hashing
38
TLS 1.2
39
protecting large amounts of data
40
The compromised password file has been brute-force hacked, and the complexity requirements are not adequate to mitigate this risk.
41
Data encryption
42
Perfect forward secrecy
43
HSMaaS
44
Installthepublickeyontheserver, Encrypt the private key.
45
Spraying
46
Dictionary
47
Password-spraying
48
DES (64)
49
An attacker was able to bypass application whitelisting by emailing a spreadsheet attachment with an embedded PowerShell in the file
50
Hashing, Private key
51
CRL
52
Forward the keys using ssh-copy-id., Forward the keys using ssh-keygen.
53
Dictionary
54
Salting
55
Blockchain
56
A wildcard certificate
57
Homomorphic
58
The S/MIME plug-in is not enabled.
59
Wildcard
60
An extended validation certificate
61
Tokenizingthecreditcardsinthedatabase
62
Checksums (hash) (integrity)
63
Pass-the-hash
64
Code signing
65
Digitally sign the relevant game files.
66
An attacker is utilizing a brute-force attack against the account.
67
The encryption algorithm longevity
68
Birthday
69
Obfuscation
70
High data entropy
71
Check the hash of the installation file
72
Pass-the-hash
73
Homomorphic
74
A message encrypted with the public key can be decrypted with the private key.
75
Passwordhash
76
Root
77
Issue a public / private key pair for each user and securely distribute a private key to each employee.
78
Digital certificate
79
Supply chain
80
Key Exchange
81
RainbowTable
82
Salting
83
Spraying
84
HTTPS://*.app1.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022 Most Voted
85
.cer
86
S/MIME
87
TLS inspection
88
Pass the hash
89
Block cipher
90
Salting
91
Time stamps, Time offset
92
Brute-force
93
Collision
94
Send a CSR to a known CA and install the signed certificate on the application's server.
95
Public key Infrastructure
96
Tokenization
97
Salting
98
Password spraying
99
Steganography
100
TLS
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Revoke the code-signing certificate.
2
High data entropy
3
0
4
the sender's private key and decrypted with the sender's public key
5
To validate the integrity of the files
6
Generate a CSR (Certificate Signing Request)
7
3DES, RC4
8
Check the hash of the installation file
9
Calculate the checksum using a hashing algorithm
10
PKI
11
Wildcard
12
Hashing
13
Using a SHA-2 signature of a drive image
14
Non-repudiation
15
Tokenizing the credit cards in the database
16
User certificate
17
The identity federation protocol, The encryption method
18
Steganography
19
SSH key
20
Data at rest
21
Brute-force
22
Salting
23
Weak encryption
24
Revoke the code signing certificate used by both programs.
25
Implement salting and hashing
26
The required intermediate certificate is not loaded as part of the certificate chain.
27
The public ledger
28
Weak credentials
29
A decryption certificate
30
DNSSEC
31
Data encryption
32
TLS
33
Implement password salting
34
Search for matching file hashes on malware websites
35
A dictionary attack
36
Password spraying
37
Hashing
38
TLS 1.2
39
protecting large amounts of data
40
The compromised password file has been brute-force hacked, and the complexity requirements are not adequate to mitigate this risk.
41
Data encryption
42
Perfect forward secrecy
43
HSMaaS
44
Installthepublickeyontheserver, Encrypt the private key.
45
Spraying
46
Dictionary
47
Password-spraying
48
DES (64)
49
An attacker was able to bypass application whitelisting by emailing a spreadsheet attachment with an embedded PowerShell in the file
50
Hashing, Private key
51
CRL
52
Forward the keys using ssh-copy-id., Forward the keys using ssh-keygen.
53
Dictionary
54
Salting
55
Blockchain
56
A wildcard certificate
57
Homomorphic
58
The S/MIME plug-in is not enabled.
59
Wildcard
60
An extended validation certificate
61
Tokenizingthecreditcardsinthedatabase
62
Checksums (hash) (integrity)
63
Pass-the-hash
64
Code signing
65
Digitally sign the relevant game files.
66
An attacker is utilizing a brute-force attack against the account.
67
The encryption algorithm longevity
68
Birthday
69
Obfuscation
70
High data entropy
71
Check the hash of the installation file
72
Pass-the-hash
73
Homomorphic
74
A message encrypted with the public key can be decrypted with the private key.
75
Passwordhash
76
Root
77
Issue a public / private key pair for each user and securely distribute a private key to each employee.
78
Digital certificate
79
Supply chain
80
Key Exchange
81
RainbowTable
82
Salting
83
Spraying
84
HTTPS://*.app1.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022 Most Voted
85
.cer
86
S/MIME
87
TLS inspection
88
Pass the hash
89
Block cipher
90
Salting
91
Time stamps, Time offset
92
Brute-force
93
Collision
94
Send a CSR to a known CA and install the signed certificate on the application's server.
95
Public key Infrastructure
96
Tokenization
97
Salting
98
Password spraying
99
Steganography
100
TLS