Search Header Logo
Cisco Cybersecurity Essentials 18.2-3

Cisco Cybersecurity Essentials 18.2-3

Assessment

Presentation

Information Technology (IT)

9th - 12th Grade

Hard

Created by

Timothy Robinson

Used 2+ times

FREE Resource

16 Slides • 9 Questions

1

media

2

media

3

Multiple Choice

Which of the following is a technique used in data masking to protect sensitive information?

1

Substitution

2

Encryption

3

Compression

4

Replication

4

media

5

Multiple Choice

Which of the following components is NOT typically involved in the process of hiding data using steganography?

1

Embedded data

2

Cover-text

3

Stego key

4

Encryption algorithm

6

Multiple Choice

Which of the following best describes the main advantage of steganography over cryptography?

1

Steganography makes the message unreadable without a key.

2

Steganography does not attract special attention to the secret message.

3

Steganography uses complex algorithms to hide data.

4

Steganography is faster than cryptography.

7

media

8

media

9

Multiple Select

Which of the following statements about social steganography is/are correct?

1

It hides information in plain sight using agreed rules or definitions.

2

It is commonly used by teens on social media to communicate secretly.

3

It relies on misspelling words or obscure references to convey hidden messages.

4

It requires advanced computer skills to implement.

10

media

11

media

12

media

13

media

14

Multiple Choice

Which of the following is NOT one of the four elements of secure communications?

1

Data Integrity

2

Data Encryption

3

Origin Authentication

4

Data Non-Repudiation

15

media

16

media

17

Multiple Select

Which properties must a cryptographic hash function possess?

1

The input can be any length

2

The output has a fixed length

3

The function is reversible

4

The function is collision free

18

media

19

media

20

media

21

Multiple Choice

What is the main advantage of using HMAC over a simple hash function for origin authentication?

1

HMAC uses a public key for hashing

2

HMAC combines a hash function with a secret key, providing authentication and defeating man-in-the-middle attacks

3

HMAC is faster than regular hash functions

4

HMAC produces longer hash values

22

media

23

media

24

Multiple Choice

Which of the following best describes the purpose of using HMAC in origin authentication, as illustrated in the figures?

1

To encrypt the message content for confidentiality

2

To ensure the message has not been altered and verify the sender's identity

3

To compress the message for faster transmission

4

To generate random keys for secure communication

25

Multiple Choice

Which of the following is NOT a data masking technique mentioned in the lesson?

1

Encryption

2

Substitution

3

Shuffling

4

Nulling out

media

Show answer

Auto Play

Slide 1 / 25

SLIDE