Cybersecurity Chapter 5

Cybersecurity Chapter 5

11th Grade

12 Qs

quiz-placeholder

Similar activities

Empowerment Technology

Empowerment Technology

11th Grade

10 Qs

Getting started with using a computer.

Getting started with using a computer.

4th Grade - University

14 Qs

Code.org Discoveries

Code.org Discoveries

9th - 11th Grade

10 Qs

Social and Ethical Significances

Social and Ethical Significances

9th - 12th Grade

12 Qs

DATABASE SERVER

DATABASE SERVER

11th Grade

15 Qs

Midterm Review 4

Midterm Review 4

11th Grade

15 Qs

Cyber Security CIW

Cyber Security CIW

11th Grade

12 Qs

Cybersecurity Unit

Cybersecurity Unit

11th Grade

12 Qs

Cybersecurity Chapter 5

Cybersecurity Chapter 5

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent email sent throughout the company stated that there would be a change in security policy. The security officer who was presume sent the message stated the message was not sent from the security office and the company may be a victim of a spoofed email. What been added to the message to ensure the message actually came from the person?

digital signature

hashing

non-repudiation

asymmetric key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is connecting to an e-commerce server to buy some widgets for a company. The user connects to the site and notices there is no browser security status bar. The site does prompt for a username and password and the user is able to log in. What is the danger in proceeding with this transaction?

The user is using the wrong browser to perform the transaction.

Ad blocker software is preventing the security bar from working properly, and thus there is no danger with the transaction.

The certificate from the site has expired, but is still secure.

The site is not using a digital certificate to secure the transaction, with the result that everything is in the clear.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of CSPRNG?

to generate salt

to prevent a computer from being a zombie

to secure a web site

to process hash lookups

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded, that the program is not changed while in transit.

What can the user do to ensure that the program is not changed.

Encrypt the program and require a password after it is downloaded.

Turn off antivirus on all the computers.

Distribute the program on a thumb drive.

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

NIST-SP800

PKI

x.503

x.509

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three validation criteria used for a validation rule? (Choose three)

size

key

range

encryption

format

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads an updated driver for a video card from a website.

A warning message pops up saying the driver is not approved.

What does the piece of software lack?

code recognition

source code

valid ID

digital signature

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?