Search Header Logo

CCNA 4 CHAPTER 2

Authored by KEN ROLLOQUE

Arts

University

Used 5+ times

CCNA 4 CHAPTER 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What is identified by the first dimension of the cybersecurity cube?

tools
knowledge
goals
safeguards
rules

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What are three types of sensitive information? (Choose three.)

public
PII
business
published
classified

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What are two common hash functions? (Choose two.)

Blowfish
SHA
MD5
ECC
RC4

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What service determines which resources a user can access along with the operations that a user can perform?

authentication
biometric
authorization
accounting
token

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

authentication
confidentiality
nonrepudiation
privacy
integrity

6.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What three design principles help to ensure high availability? (Choose three.)

detect failures as they occur
eliminate single points of failure
check for data consistency
use encryption
provide for reliable crossover

7.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

where you are
something you are
something you know
something you do
something you have

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?