Neta Quiz 2

Neta Quiz 2

11th Grade

20 Qs

quiz-placeholder

Similar activities

OCR GCSE CS MCQs 2.3 Defensive Design

OCR GCSE CS MCQs 2.3 Defensive Design

10th - 11th Grade

20 Qs

ITF Cert Review

ITF Cert Review

9th - 12th Grade

15 Qs

Device Configuration and Management- Domains 3 & 4

Device Configuration and Management- Domains 3 & 4

9th - 12th Grade

16 Qs

Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

C1 Cryptography & Encryption

C1 Cryptography & Encryption

11th Grade

15 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

Neta Quiz 2

Neta Quiz 2

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Geok Soon Sia

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is identified by the first dimension of the cybersecurity cube?

tools

knowledge

goals

safeguards

2.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are three types of sensitive information? (Choose three.)

declassified

public

PII

buisness

classified

3.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are two common hash functions? (Choose two.)

Blowfish

SHA

MD5

RSA

RC4

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What service determines which resources a user can access along with the operations that a user can perform?

authentication

biometric

authorization

accounting

token

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

authentication

confidentiality

nonrepudiation

privacy

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What three design principles help to ensure high availability? (Choose three.)

detect failures as they occur

eliminate single points of failure

check for data consistency

provide for reliable crossover

7.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

where you are

something you are

something you know

something you have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?