CASS Introduction Quiz

CASS Introduction Quiz

Professional Development

9 Qs

quiz-placeholder

Similar activities

CNS_1

CNS_1

Professional Development

10 Qs

Awareness ISO 27001:2022

Awareness ISO 27001:2022

Professional Development

13 Qs

WY-TOPP/WY-ALT Assessment Security Quiz

WY-TOPP/WY-ALT Assessment Security Quiz

Professional Development

9 Qs

Security Analyst Training Quiz

Security Analyst Training Quiz

Professional Development

10 Qs

[Progress Check 01-1] Overview of Assurance Engagement

[Progress Check 01-1] Overview of Assurance Engagement

Professional Development

11 Qs

ArmorCode InfoSec Quiz

ArmorCode InfoSec Quiz

Professional Development

10 Qs

M4Q1

M4Q1

Professional Development

10 Qs

PRS FP2018 Quiz CHAPTER 7

PRS FP2018 Quiz CHAPTER 7

Professional Development

10 Qs

CASS Introduction Quiz

CASS Introduction Quiz

Assessment

Quiz

Professional Development, Philosophy

Professional Development

Hard

Created by

ahlam ansari

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cryptography can provide

Entity authentication

Nonrepudiation of messages

Confidentiality

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The type of threats on the security of a computer system or network are ……………………..

Interruption

Deception

Fabrication

Modification

Interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use Cryptography term to transforming messages to make them secure and immune to

a. Change

b. Idle

c. Attacks

d. Defend

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use Cryptography term to transforming messages to make them secure and immune to

a. Change

b. Idle

c. Attacks

d. Defend

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.

Connection Integrity without Recovery

Selective-Field Connection Integrity

Connectionless Integrity

Traffic Flow Confidentiality

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ Requires that computer system assets be available to authorized parties when needed.

Integrity

Confidentiality

Authorization

Availability

9.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

SPECIFIC SECURITY MECHANISMS are ___

Encipherment

Digital Signature

Access Control

Event Detection