Search Header Logo

CISSP dag 4

Authored by Samuel Bergmann

Professional Development

Professional Development

Used 4+ times

CISSP dag 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The process of hiding data in images is called _____________.

Steganography

Encryption

Cryptography

Symmetric encryption

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Diffie Hellman can be used for which of the following?

Encryption

Key exchange

Digital signature

Hashing

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

To provide non-repudiation the sending party must sign with what key?

Private key

Public key

Shared key

No key is used, only hashing

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is a critical part of physical security?

Guard dogs

Layered access control

Fences

CCTV

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

You have been asked to serve as a consultant on the design of a new facility. Which of the following would you say offers the best location for the server room?

Near the outside of the building

Near the center of the building

In an area that will have plenty of traffic where equipment can be observed by other employees and guests

In an area that offers easy access

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?