Cybersecurity Chapter 5

Quiz
•
Computers
•
11th Grade
•
Hard

E Sheng Toh
Used 2+ times
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A recent email sent throughout the company stated that there would be a change in security policy. The security officer who was presume sent the message stated the message was not sent from the security office and the company may be a victim of a spoofed email. What been added to the message to ensure the message actually came from the person?
digital signature
hashing
non-repudiation
asymmetric key
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is connecting to an e-commerce server to buy some widgets for a company. The user connects to the site and notices there is no browser security status bar. The site does prompt for a username and password and the user is able to log in. What is the danger in proceeding with this transaction?
The user is using the wrong browser to perform the transaction.
Ad blocker software is preventing the security bar from working properly, and thus there is no danger with the transaction.
The certificate from the site has expired, but is still secure.
The site is not using a digital certificate to secure the transaction, with the result that everything is in the clear.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of CSPRNG?
to generate salt
to prevent a computer from being a zombie
to secure a web site
to process hash lookups
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded, that the program is not changed while in transit.
What can the user do to ensure that the program is not changed.
Encrypt the program and require a password after it is downloaded.
Turn off antivirus on all the computers.
Distribute the program on a thumb drive.
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the standard for a public key infrastructure to manage digital certificates?
NIST-SP800
PKI
x.503
x.509
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three validation criteria used for a validation rule? (Choose three)
size
key
range
encryption
format
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user downloads an updated driver for a video card from a website.
A warning message pops up saying the driver is not approved.
What does the piece of software lack?
code recognition
source code
valid ID
digital signature
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Design Principles

Quiz
•
9th - 11th Grade
14 questions
Getting started with using a computer.

Quiz
•
4th Grade - University
12 questions
Social and Ethical Significances

Quiz
•
9th - 12th Grade
8 questions
Windows Updates

Quiz
•
9th Grade - Professio...
16 questions
IBA Chapter 8B

Quiz
•
8th - 12th Grade
15 questions
Malware

Quiz
•
9th - 11th Grade
10 questions
POCS-Ch2.1 (Vocab)

Quiz
•
7th - 12th Grade
15 questions
Computer Knowledge Challenge

Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
10 questions
Multiply Fractions

Quiz
•
6th Grade