Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

quiz-placeholder

Similar activities

VMware Certified Professional - DCV 2V0-21.23

VMware Certified Professional - DCV 2V0-21.23

Professional Development

20 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

isc2 sample questions

isc2 sample questions

Professional Development

14 Qs

AWS ACF Módulo 3 -  Visão da infraestrutura global da AWS

AWS ACF Módulo 3 - Visão da infraestrutura global da AWS

Professional Development

15 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

General ICT

General ICT

Professional Development

20 Qs

SEC+ Ch.9 Review Test

SEC+ Ch.9 Review Test

Professional Development

15 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

Cyber Quiz

Cyber Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Dove Soap

Used 15+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the best definition of personally identifiable information (PII)?

Data that is collected from servers and web browsers using cookies in order to track a customer

Data that is collected by businesses to track the digital behaviors of customers

Data that is collected by businesses to distinguish identities of individuals

Data that is collected from servers and websites for anonymous browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

   ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt

read, write, execute

read only

full access

read, write

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

server

intermediary

client

secondary

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

AES

ESP

MD5

IPsec

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which layer of the hierarchical design model is a control boundary between the other layers?

core

network

access

distribution

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which access control model allows users to control access to data as an owner of that data?

attribute-based access control

mandatory access control

discretionary access control

nondiscretionary access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

nonrepudiation

authentication

integrity

confidentiality

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?