

securitty chapter 1
Presentation
•
Computers
•
University
•
Easy
earnest colvin
Used 5+ times
FREE Resource
51 Slides • 20 Questions
1
securitty chapter 1

2
3
4
Multiple Choice
As a security professional, you are responsible for data protection. You are NOT responsible for compromised reputation, loss of goodwill, loss of customers, or financial impacts.
true
false
5
Multiple Choice
Information security refers to the protection of available information or information resources from authorized access, attacks, thefts, or data damage.
true
false
6
7
8
Multiple Choice
A security lock on a building’s access door is an example of what type of security control?
Correction control
Detection control
Prevention control
9
Multiple Choice
Surveillance cameras that view all that happens around a building are an example of what type of security control?
Correction control
Detection control
10
Multiple Choice
A security guard who responds to a silent alarm is an example of what type of security control?
Correction control
Detection control
11
Multiple Select
What are the three primary goals involved in the practice of information security? Select three
Risk
Prevention
Detection
Recovery
12
13
14
15
16
17
18
19
20
21
22
Multiple Select
What is the triad of specific principles related to information security? Select three.
Confidentiality
Integrity
Availability
Non-repudiation
23
24
25
Multiple Choice
The goal of ensuring the party that sent a transmission or created data remains associated with that data is ___________________.
Identification
Non-repudiation
26
27
Multiple Choice
A method that ensures that an entity requesting access to resources by using a certain set of credentials is the true owner of the credentials is ____________________.
Identification
Non-repudiation
28
29
Multiple Choice
A method of validating a particular entity or individual’s unique credentials is ______________.
Availability
Authentication
30
31
32
33
34
35
36
37
38
39
Multiple Choice
Physical or virtual objects that store authentication information are __________.
Biometrics
Tokens
40
41
42
Multiple Choice
A radio-frequency ID embedded into hardware is an example of what type of authentication method?
Biometrics
Geolocation
43
44
45
Multiple Choice
Providing information such as who you are, what you have, and what you know are examples of what type of authentication?
Mutual Authentication
Multi-factor Authentication
46
47
48
49
50
51
52
53
54
55
56
57
Multiple Choice
An algorithm used to encrypt, or decrypt data is ___________________.
Quantum
Cipher
58
Multiple Choice
A type of encryption that encrypts data one bit at a time is a
Bit Cipher
Stream Cipher
59
60
61
62
63
Multiple Choice
A two-way encryption scheme in which encryption and decryption are both performed by the same key is ____________________.
Hashing Encryption
Symmetric Encryption
64
65
Multiple Choice
A one-way encryption that transforms clear text into cipher text that is not intended to be decrypted is referred to as ___________________________.
Hashing Encryption
One-time Pad
66
Multiple Choice
A two-way encryption scheme implementing both a private key and a public key is _______________________.
Hashing Encryption
Asymmetric Encryption
67
Multiple Choice
A collection of asymmetric and symmetric encryption algorithms used to establish secure communications is known as _____________________.
Session Key
Cipher Suite
68
69
Multiple Choice
Hiding information in a photograph is an example of what type of cipher process?
Graphic Cipher
Steganography
70
71
securitty chapter 1

Show answer
Auto Play
Slide 1 / 71
SLIDE
Similar Resources on Wayground
69 questions
CS124 - Programming Language - Statement-Level Control Struc
Lesson
•
University
67 questions
Bahasa Inggris 2 Meeting 4 and 5
Lesson
•
University
66 questions
Pedagogik 1 - Teori Belajar
Lesson
•
University
66 questions
Introduction to Multimedia
Lesson
•
University
65 questions
ITCC102-W7(SY24-25_101I)
Lesson
•
University
68 questions
Comptia A+ Review 1001- Networking 1
Lesson
•
University
64 questions
ITCC102-W8(SY24-25_101i)
Lesson
•
University
Popular Resources on Wayground
10 questions
5.P.1.3 Distance/Time Graphs
Quiz
•
5th Grade
10 questions
Fire Drill
Quiz
•
2nd - 5th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
15 questions
Hargrett House Quiz: Community & Service
Quiz
•
5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
18 questions
Informative or Argumentative essay
Quiz
•
5th Grade - University
20 questions
Disney Trivia
Quiz
•
University
20 questions
8.II_Review_TEACHER
Quiz
•
University
39 questions
Unit 7 Key Terms
Quiz
•
11th Grade - University
20 questions
Subject verb agreement practice
Quiz
•
University
20 questions
Quadrilaterals
Quiz
•
KG - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
25 questions
WWI, Great Depression, WWII
Quiz
•
KG - University