Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

quiz-placeholder

Similar activities

Cloud Computing_3

Cloud Computing_3

Professional Development

20 Qs

AWS-Basics

AWS-Basics

Professional Development

20 Qs

ITF - Quiz 14.1 - Access Controls

ITF - Quiz 14.1 - Access Controls

Professional Development

14 Qs

Web Application Security Testing-PostTest

Web Application Security Testing-PostTest

Professional Development

18 Qs

ICT Support Staff Examination

ICT Support Staff Examination

Professional Development

20 Qs

Asdm-midquiz

Asdm-midquiz

Professional Development

20 Qs

AWS Cloud

AWS Cloud

Professional Development

15 Qs

DS_Midterm Exam

DS_Midterm Exam

Professional Development

20 Qs

Cyber Quiz

Cyber Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Dove Soap

Used 15+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the best definition of personally identifiable information (PII)?

Data that is collected from servers and web browsers using cookies in order to track a customer

Data that is collected by businesses to track the digital behaviors of customers

Data that is collected by businesses to distinguish identities of individuals

Data that is collected from servers and websites for anonymous browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

   ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt

read, write, execute

read only

full access

read, write

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

server

intermediary

client

secondary

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

AES

ESP

MD5

IPsec

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which layer of the hierarchical design model is a control boundary between the other layers?

core

network

access

distribution

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which access control model allows users to control access to data as an owner of that data?

attribute-based access control

mandatory access control

discretionary access control

nondiscretionary access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

nonrepudiation

authentication

integrity

confidentiality

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?