CCNA 4 CHAPTER 2

CCNA 4 CHAPTER 2

University

20 Qs

quiz-placeholder

Similar activities

Naruo

Naruo

3rd Grade - Professional Development

19 Qs

XI-rupa 5

XI-rupa 5

12th Grade - Professional Development

20 Qs

Disney Trivia

Disney Trivia

University

15 Qs

Anime quiz!

Anime quiz!

5th Grade - University

15 Qs

QUIZ KD 3.11 PERENCANAAN TANAMAN HIAS

QUIZ KD 3.11 PERENCANAAN TANAMAN HIAS

12th Grade - University

20 Qs

AHGD1103 - DRY MEDIA DRAWING

AHGD1103 - DRY MEDIA DRAWING

University

20 Qs

Tebak Gambar Ice Breaking

Tebak Gambar Ice Breaking

University

15 Qs

Canva Basic

Canva Basic

KG - University

18 Qs

CCNA 4 CHAPTER 2

CCNA 4 CHAPTER 2

Assessment

Quiz

Arts

University

Practice Problem

Easy

Created by

KEN ROLLOQUE

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What is identified by the first dimension of the cybersecurity cube?

tools
knowledge
goals
safeguards
rules

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What are three types of sensitive information? (Choose three.)

public
PII
business
published
classified

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What are two common hash functions? (Choose two.)

Blowfish
SHA
MD5
ECC
RC4

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What service determines which resources a user can access along with the operations that a user can perform?

authentication
biometric
authorization
accounting
token

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

authentication
confidentiality
nonrepudiation
privacy
integrity

6.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What three design principles help to ensure high availability? (Choose three.)

detect failures as they occur
eliminate single points of failure
check for data consistency
use encryption
provide for reliable crossover

7.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

where you are
something you are
something you know
something you do
something you have

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?