Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

quiz-placeholder

Similar activities

GRAND OPENING INTERNSHIP EXERCISE 2024

GRAND OPENING INTERNSHIP EXERCISE 2024

Professional Development

13 Qs

Arrays & Strings using C

Arrays & Strings using C

Professional Development

15 Qs

Infomatrix 2018

Infomatrix 2018

1st Grade - Professional Development

13 Qs

Pretest Camtasia 2019

Pretest Camtasia 2019

Professional Development

20 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

BCA - IV SEM DBMS

BCA - IV SEM DBMS

Professional Development

20 Qs

Teaching Strategy

Teaching Strategy

Professional Development

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

Cyber Quiz

Cyber Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Dove Soap

Used 15+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the best definition of personally identifiable information (PII)?

Data that is collected from servers and web browsers using cookies in order to track a customer

Data that is collected by businesses to track the digital behaviors of customers

Data that is collected by businesses to distinguish identities of individuals

Data that is collected from servers and websites for anonymous browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

   ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt

read, write, execute

read only

full access

read, write

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

server

intermediary

client

secondary

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

AES

ESP

MD5

IPsec

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which layer of the hierarchical design model is a control boundary between the other layers?

core

network

access

distribution

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which access control model allows users to control access to data as an owner of that data?

attribute-based access control

mandatory access control

discretionary access control

nondiscretionary access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

nonrepudiation

authentication

integrity

confidentiality

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?