
TestOut SecurityPro (9.1 - 9.4)

Quiz
•
Computers
•
University
•
Medium

James Stephens
Used 3+ times
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When you dispose of a computer or sell used hardware & it's crucial that none of the data on the hard disks can be recovered.
Which of the following actions can you take to ensure that no data is recoverable? (9.1, 1/6)
Damage the hard disks so badly that all data remanence is gone.
Reformat all the hard disks in the computer.
Delete all files from all the hard disks in the computer.
Encrypt all the data on the hard disks.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk? (9.1 2/6)
Shredding
Degaussing
Pulping
Purging
Pulverizing
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following government acts protects medical records and person health information? (9.1 3/6)
FISMA
FACTA
HIPAA
ACA
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be sued to do personal harm to you. These pieces of info include the following:
- Name & address
- Driver license number
- Credit card numbers
- Date of birth
Which of the following classifications does this information fall into? (9.1 6/6)
Proprietary information
Private restricted information
Private internal information
Personally identifiable information
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You want email sent from users in your organization to be encrypted to make messages more secure. Which of the following is an option you can use to enhance the encryption of email messages? (9.2 3/5)
A symmetric key exchange
A hashing service provider
A cryptographic service provider
An asymmetric key exchange
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
At the end of the cryptographic process, output is generated. With one type of output, simple character changes in the plaintext will cause several characters to change in the cipher text.
What type of output is this? (9.2 4/5)
Encryption
Hashing
Collision
Diffusion
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If a message sender encrypts a message with a key and a message receiver decrypts it using the same key, which type of key exchange is taking place? (9.2 5/5)
Digital signature
Asymmetric
Symmetric
Counter mode
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
037_Misconfiguration Vulnerabilities – CompTIA Security+

Quiz
•
9th Grade - University
25 questions
IAS QUIZ 12

Quiz
•
University
25 questions
IAS CH3 QUIZ

Quiz
•
University
25 questions
Cybersecurity Fundamentals Practice Quiz

Quiz
•
University
22 questions
last22

Quiz
•
University
22 questions
Utility Software

Quiz
•
KG - University
30 questions
IAS CH6 QUIZ

Quiz
•
University
23 questions
Cyber Security

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade