Cybersecurity Ess

Cybersecurity Ess

University

10 Qs

quiz-placeholder

Similar activities

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Chapter 4

Chapter 4

University

10 Qs

Cybersecurity Fundamentals Week 6 Quiz

Cybersecurity Fundamentals Week 6 Quiz

KG - University

10 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Type of Attacks

Type of Attacks

University

9 Qs

QUIZ 2 HTML

QUIZ 2 HTML

University

10 Qs

Знаешь ли ты CSS?

Знаешь ли ты CSS?

University

10 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Cybersecurity Ess

Cybersecurity Ess

Assessment

Quiz

Computers

University

Hard

Created by

Joan Lim

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the acronym IoE represent?

Intermediate into Everything

Internet of Everything

Intelligence on Everything

Internet of Everyday

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the term vulnerability mean?

a potential threat that a hacker creates

a known target or victim machine

a weakness that makes a target susceptible to an attack

a method of attack to exploit a target

3.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are the three states of data? (Choose three.)

in-transit

at rest

encrypted

in-process

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are two common hash functions? (Choose two.)

MD5

RSA

SHA

Phishing

Answer explanation

SHA and MD5 use use complex mathematical algorithms to compute hash values.

5.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which two methods help to ensure data integrity? (Choose two.)

data consistency checks

repudiation

availability

hashing

Answer explanation

Data integrity systems include one of the two data integrity methods.

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

Something you know

Something you do

Something you have

Something you are

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a rootkit modify?

Programs

Antivirus

Microsoft Word

OS

Answer explanation

A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?