Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

Malware

Malware

9th - 11th Grade

15 Qs

Cybersecurity Chapter 5

Cybersecurity Chapter 5

11th Grade

12 Qs

Client/Server side

Client/Server side

7th - 12th Grade

10 Qs

Cyber Security CIW

Cyber Security CIW

11th Grade

12 Qs

Utility

Utility

12th Grade

13 Qs

Virus and Spyware

Virus and Spyware

6th - 8th Grade

10 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

KG - University

10 Qs

Viruses & Malware

Viruses & Malware

6th - 8th Grade

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

Assessment

Quiz

Computers

KG - University

Easy

Created by

Marcus Phang

Used 60+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method tries all possible passwords until a match is found?

birthday

dictionary

brute force

rainbow tables

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?

valid ID

source code

digital signature

code recognition

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Write down one criteria used for validation rule.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user wants to ensure that when new users downloaded his newly created program, the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Distribute the program on a thumb drive.

Install the program on individual computers.

Encrypt the program and require a password after it is downloaded.

Create a hash of the program file and use it to verify the integrity of the file after download

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

x.509

NIST-SP800

x.503

PKI

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent breach at a company due to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?

weak encryption

bad usernames

poor input validation

lack of operating system patching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strength of using a hashing function?

It has a variable length output.

It can take only a fixed length message.

It is a one-way function and not reversible.

Two different files can be created that have the same output.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?