CNS_1

CNS_1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Mentoring Quiz Session 5 6th Sept

Mentoring Quiz Session 5 6th Sept

Professional Development

8 Qs

MY Quiz 1

MY Quiz 1

Professional Development

10 Qs

Security Analyst Training Quiz

Security Analyst Training Quiz

Professional Development

10 Qs

The Good Research

The Good Research

Professional Development

7 Qs

QMS Internal Audit (Pre-Test)

QMS Internal Audit (Pre-Test)

Professional Development

10 Qs

Mastering Security Basics

Mastering Security Basics

Professional Development

15 Qs

Telpas - Irregularities

Telpas - Irregularities

Professional Development

8 Qs

M4-Q1

M4-Q1

Professional Development

10 Qs

CNS_1

CNS_1

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Sudhir Pattanaik

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

Disruption

Replay

Service denial

Masquerade

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is____________

integrity

encryption

analysis

masquerade

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A __________ takes place when one entity pretends to be a different entity

replay

masquerade

passive attack

service denial

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is the protection of transmitted data from passive attacks

Access control

Data control

Nonrepudiation

Confidentiality

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The protection of the information that might be derived from observation of traffic flows is _________

connectionless confidentiality

connection confidentiality

traffic- flow confidentiality

selective- field confidentiality

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced.

catastrophic

moderate

low

high

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The methods of __________ conceal the existence of the message in a graphic

image.

steganography

decryptology

cryptology

cryptography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?