Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

Data Privacy and Security

Data Privacy and Security

9th Grade - University

14 Qs

Systems Administration and Maintenance Prelim Quiz 2

Systems Administration and Maintenance Prelim Quiz 2

University

15 Qs

Web application security

Web application security

Professional Development

10 Qs

AC 3 Vocab

AC 3 Vocab

8th Grade

10 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

Physical vs Software restrictions

Physical vs Software restrictions

10th Grade

10 Qs

AP CSP Unit 3

AP CSP Unit 3

9th - 12th Grade

14 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

KG - University

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

Assessment

Quiz

Computers

KG - University

Easy

Created by

Marcus Phang

Used 60+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method tries all possible passwords until a match is found?

birthday

dictionary

brute force

rainbow tables

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?

valid ID

source code

digital signature

code recognition

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Write down one criteria used for validation rule.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user wants to ensure that when new users downloaded his newly created program, the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Distribute the program on a thumb drive.

Install the program on individual computers.

Encrypt the program and require a password after it is downloaded.

Create a hash of the program file and use it to verify the integrity of the file after download

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

x.509

NIST-SP800

x.503

PKI

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent breach at a company due to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?

weak encryption

bad usernames

poor input validation

lack of operating system patching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strength of using a hashing function?

It has a variable length output.

It can take only a fixed length message.

It is a one-way function and not reversible.

Two different files can be created that have the same output.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?