
Cybersecurity Ess
Authored by Joan Lim
Computers
University
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What does the acronym IoE represent?
Intermediate into Everything
Internet of Everything
Intelligence on Everything
Internet of Everyday
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What does the term vulnerability mean?
a potential threat that a hacker creates
a known target or victim machine
a weakness that makes a target susceptible to an attack
a method of attack to exploit a target
3.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are the three states of data? (Choose three.)
in-transit
at rest
encrypted
in-process
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are two common hash functions? (Choose two.)
MD5
RSA
SHA
Phishing
Answer explanation
SHA and MD5 use use complex mathematical algorithms to compute hash values.
5.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Which two methods help to ensure data integrity? (Choose two.)
data consistency checks
repudiation
availability
hashing
Answer explanation
Data integrity systems include one of the two data integrity methods.
6.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
Something you know
Something you do
Something you have
Something you are
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What does a rootkit modify?
Programs
Antivirus
Microsoft Word
OS
Answer explanation
A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?