Crypto-graph not currency

Crypto-graph not currency

University

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

AISMQuiz1

AISMQuiz1

University

11 Qs

gravity falls

gravity falls

KG - University

10 Qs

Chapter 7 Payment Systems

Chapter 7 Payment Systems

University

18 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

CIS7 Quiz 3 Review

CIS7 Quiz 3 Review

University

15 Qs

AWS-EXAM-BATCH-6

AWS-EXAM-BATCH-6

University

20 Qs

Crypto-graph not currency

Crypto-graph not currency

Assessment

Quiz

Other

University

Medium

Created by

Avinav Neupane

Used 9+ times

FREE Resource

15 questions

Show all answers

1.

WORD CLOUD QUESTION

30 sec • Ungraded

The CIA impacts the (___________ security)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "A" in CIA Triad stand for?

Authentication

Availability

Authorization

Actually

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which part of the CIA triad impacts the access in terms with, information access to authorized users ?

Confidentiality

Integrity

Availability

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a security control in CIA triad that primarily addresses the "Integrity" aspect ?

Biometric Authentication

Hash Functions

Firewalls

Redundant Servers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "AAA" acronym stand for in the context of network security services ?

Access, Authentication, Authorization

Audit, Access, Authentication

Authentication, Authorization, Accounting

Availability, Authorization, Accounting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the AAA service tracks the actions of users and systems for security and analysis purposes?

Authentication

Authorization

Accounting

Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Caesar Cipher, what is the key element used for encryption and decryption ?

Shift value

Substitution table

Matrix

Permutation key

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?