Chapter 2

Chapter 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

Ethics-Reliability and productivity

Ethics-Reliability and productivity

Professional Development

10 Qs

Agency OBX -Day 1 Quiz

Agency OBX -Day 1 Quiz

Professional Development

15 Qs

SSO Briefing Day 2024

SSO Briefing Day 2024

Professional Development

10 Qs

Test your understanding: Exploring a Well

Test your understanding: Exploring a Well

Professional Development

14 Qs

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Teachers Day Fun Quiz

Teachers Day Fun Quiz

Professional Development

11 Qs

All About MS Teams

All About MS Teams

Professional Development

10 Qs

OJK Cerdas SAIRERI Kolaborasi Digital Banking

OJK Cerdas SAIRERI Kolaborasi Digital Banking

Professional Development

10 Qs

Chapter 2

Chapter 2

Assessment

Quiz

Other

Professional Development

Practice Problem

Hard

Created by

sam foon

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What name is given to a storage device connected to a network?

DAS

NAS

SAN

RAID

Answer explanation

Refer to Chapter 2 - Slides 15 - Data at Rest
A network attached storage (NAS) device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are the three states of data? (Choose three.)

at rest

encrypted

in-process

in-transit

Answer explanation

Refer to chapter 2 slide 14-17
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest. 

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a method of sending information from one device to another using removable media?

sneaker net, sneakernet

ms teams

wired networks

wireless networks

Answer explanation

Refer to Chapter 2 - Slides 16 - Data In Transit
Sneaker net – uses removable media to physically move data from one computer to another

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two methods help to ensure data integrity? (Choose two.)

hashing

repudiation

availability

data consistency checks

Answer explanation

Refer to Chapter 2 - Slides 11 - Integrity
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. 

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource. 

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are two common hash functions? (Choose two.)

Blowfish

MD5

RSA

SHA

Answer explanation

Refer to Chapter 2 - Slides 11 - Integrity
Common hash functions include MD5, SHA-1, SHA-256, and SHA-512. These hash functions use complex mathematical algorithms. The hashed value is simply there for comparison. For example, after downloading a file, the user can verify the integrity of the file by comparing the hash values from the source with the one generated by any hash calculator.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What mechanism can organizations use to prevent accidental changes by authorized users?

backups

encryption

hashing

version control

Answer explanation

Refer to Chapter 2 - Slides 11 - Integrity
Organizations use version control to prevent accidental changes by authorized users. Two users cannot update the same object. Objects can be files, database records, or transactions. For example, the first user to open a document has the permission to change that document; the second person has a read-only version.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?