Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

ICT S120 (Prelim Review)

ICT S120 (Prelim Review)

11th Grade

15 Qs

Microbit Features Activity

Microbit Features Activity

6th - 8th Grade

9 Qs

E-svijet, 3. razred

E-svijet, 3. razred

3rd - 4th Grade

15 Qs

Bài 4: Thủ tục trong Logo (tiếp theo) - lớp 5

Bài 4: Thủ tục trong Logo (tiếp theo) - lớp 5

5th Grade

10 Qs

Robotica 2018

Robotica 2018

5th - 9th Grade

11 Qs

Ôn tập giữa kỳ

Ôn tập giữa kỳ

KG

10 Qs

EVALUACIÓN QUINTO

EVALUACIÓN QUINTO

1st Grade

10 Qs

ICT GRADE 1

ICT GRADE 1

1st Grade

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

Assessment

Quiz

Computers

KG - University

Easy

Created by

Marcus Phang

Used 60+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method tries all possible passwords until a match is found?

birthday

dictionary

brute force

rainbow tables

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?

valid ID

source code

digital signature

code recognition

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Write down one criteria used for validation rule.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user wants to ensure that when new users downloaded his newly created program, the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Distribute the program on a thumb drive.

Install the program on individual computers.

Encrypt the program and require a password after it is downloaded.

Create a hash of the program file and use it to verify the integrity of the file after download

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

x.509

NIST-SP800

x.503

PKI

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent breach at a company due to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?

weak encryption

bad usernames

poor input validation

lack of operating system patching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strength of using a hashing function?

It has a variable length output.

It can take only a fixed length message.

It is a one-way function and not reversible.

Two different files can be created that have the same output.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?