CCNA 4 CHAPTER 2

CCNA 4 CHAPTER 2

University

20 Qs

quiz-placeholder

Similar activities

Imperative Sentence

Imperative Sentence

3rd Grade - University

20 Qs

Rahman’s Best Album

Rahman’s Best Album

8th Grade - Professional Development

16 Qs

213 No Stress Review Test

213 No Stress Review Test

University

21 Qs

DBMS

DBMS

University

25 Qs

Football

Football

4th Grade - University

22 Qs

"Brooklyn" (2015) Overview

"Brooklyn" (2015) Overview

10th Grade - University

18 Qs

quiz # 1

quiz # 1

University

21 Qs

Jacksons dopeness quiz (biology review)

Jacksons dopeness quiz (biology review)

1st Grade - Professional Development

22 Qs

CCNA 4 CHAPTER 2

CCNA 4 CHAPTER 2

Assessment

Quiz

Arts

University

Easy

Created by

KEN ROLLOQUE

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What is identified by the first dimension of the cybersecurity cube?
tools
knowledge
goals
safeguards
rules

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What are three types of sensitive information? (Choose three.)
public
PII
business
published
classified

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What are two common hash functions? (Choose two.)
Blowfish
SHA
MD5
ECC
RC4

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What service determines which resources a user can access along with the operations that a user can perform?
authentication
biometric
authorization
accounting
token

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
authentication
confidentiality
nonrepudiation
privacy
integrity

6.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. What three design principles help to ensure high availability? (Choose three.)
detect failures as they occur
eliminate single points of failure
check for data consistency
use encryption
provide for reliable crossover

7.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
where you are
something you are
something you know
something you do
something you have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?