Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

quiz-placeholder

Similar activities

TCH_Induction

TCH_Induction

Professional Development

12 Qs

GIT

GIT

Professional Development

15 Qs

Pre Test Fundamental Kotlin

Pre Test Fundamental Kotlin

Professional Development

20 Qs

Membangun Program Security Awareness

Membangun Program Security Awareness

University - Professional Development

20 Qs

Volume 2

Volume 2

Professional Development

17 Qs

6

6

Professional Development

20 Qs

wu3retofinal

wu3retofinal

Professional Development

18 Qs

Réseau

Réseau

Professional Development

19 Qs

Cyber Quiz

Cyber Quiz

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Dove Soap

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the best definition of personally identifiable information (PII)?

Data that is collected from servers and web browsers using cookies in order to track a customer

Data that is collected by businesses to track the digital behaviors of customers

Data that is collected by businesses to distinguish identities of individuals

Data that is collected from servers and websites for anonymous browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

   ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt

read, write, execute

read only

full access

read, write

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

server

intermediary

client

secondary

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

AES

ESP

MD5

IPsec

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which layer of the hierarchical design model is a control boundary between the other layers?

core

network

access

distribution

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which access control model allows users to control access to data as an owner of that data?

attribute-based access control

mandatory access control

discretionary access control

nondiscretionary access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

nonrepudiation

authentication

integrity

confidentiality

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?