CASS Introduction Quiz

CASS Introduction Quiz

Professional Development

9 Qs

quiz-placeholder

Similar activities

Basic Hardware Quiz

Basic Hardware Quiz

Professional Development

10 Qs

Education Act of 1982

Education Act of 1982

Professional Development

10 Qs

ESL Vocabulary: Technology 1

ESL Vocabulary: Technology 1

University - Professional Development

10 Qs

INTO Artificial Intelligence

INTO Artificial Intelligence

University - Professional Development

10 Qs

Quiz Cari Aman sebelum Cari Duit

Quiz Cari Aman sebelum Cari Duit

Professional Development

10 Qs

Internal Audit Refreshment

Internal Audit Refreshment

Professional Development

10 Qs

Mrs. Riel's Class

Mrs. Riel's Class

KG - Professional Development

10 Qs

Random stuff

Random stuff

KG - Professional Development

12 Qs

CASS Introduction Quiz

CASS Introduction Quiz

Assessment

Quiz

Professional Development, Philosophy

Professional Development

Practice Problem

Hard

Created by

ahlam ansari

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cryptography can provide

Entity authentication

Nonrepudiation of messages

Confidentiality

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The type of threats on the security of a computer system or network are ……………………..

Interruption

Deception

Fabrication

Modification

Interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use Cryptography term to transforming messages to make them secure and immune to

a. Change

b. Idle

c. Attacks

d. Defend

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use Cryptography term to transforming messages to make them secure and immune to

a. Change

b. Idle

c. Attacks

d. Defend

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.

Connection Integrity without Recovery

Selective-Field Connection Integrity

Connectionless Integrity

Traffic Flow Confidentiality

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?