
TestOut SecurityPro (9.1 - 9.4)
Authored by James Stephens
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When you dispose of a computer or sell used hardware & it's crucial that none of the data on the hard disks can be recovered.
Which of the following actions can you take to ensure that no data is recoverable? (9.1, 1/6)
Damage the hard disks so badly that all data remanence is gone.
Reformat all the hard disks in the computer.
Delete all files from all the hard disks in the computer.
Encrypt all the data on the hard disks.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk? (9.1 2/6)
Shredding
Degaussing
Pulping
Purging
Pulverizing
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following government acts protects medical records and person health information? (9.1 3/6)
FISMA
FACTA
HIPAA
ACA
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be sued to do personal harm to you. These pieces of info include the following:
- Name & address
- Driver license number
- Credit card numbers
- Date of birth
Which of the following classifications does this information fall into? (9.1 6/6)
Proprietary information
Private restricted information
Private internal information
Personally identifiable information
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You want email sent from users in your organization to be encrypted to make messages more secure. Which of the following is an option you can use to enhance the encryption of email messages? (9.2 3/5)
A symmetric key exchange
A hashing service provider
A cryptographic service provider
An asymmetric key exchange
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
At the end of the cryptographic process, output is generated. With one type of output, simple character changes in the plaintext will cause several characters to change in the cipher text.
What type of output is this? (9.2 4/5)
Encryption
Hashing
Collision
Diffusion
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If a message sender encrypts a message with a key and a message receiver decrypts it using the same key, which type of key exchange is taking place? (9.2 5/5)
Digital signature
Asymmetric
Symmetric
Counter mode
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH
Quiz
•
5th Grade - University
25 questions
PAS Kelas 7 Ganjil
Quiz
•
7th Grade - University
25 questions
ITEC 103 | SLM 1 QUIZ
Quiz
•
University
26 questions
Analysis Algorithms Introduction
Quiz
•
University
25 questions
Quiz TRM-1B #materi2-6
Quiz
•
University
23 questions
Secure Programming Practices
Quiz
•
University
23 questions
Cultura TIC
Quiz
•
University
25 questions
Cellular wireless networks
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade