DST07 - Day 2 quiz

DST07 - Day 2 quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

CEH Study Guide - 13 Cryptography

CEH Study Guide - 13 Cryptography

Professional Development

15 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

Security+ Study Guide-10 Understanding Cryptography and PKI

Security+ Study Guide-10 Understanding Cryptography and PKI

Professional Development

15 Qs

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

Professional Development

11 Qs

Security+ Lesson 3

Security+ Lesson 3

Professional Development

6 Qs

Enkripsi - Pretest

Enkripsi - Pretest

Professional Development

10 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

DST07 - Day 2 quiz

DST07 - Day 2 quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Gary Martyn

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a form of Encryption?

Symmetric

Isometric

Hashing

Asymmetric

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of encryption uses public and private keys?

Symmetric

Isometric

Hashing

Asymmetric

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which form of encryption can data be scrambled, but not returned to the plain text form?

Symmetric

Isometric

Hashing

Asymmetric

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the simple cypher where you shift letters of the alphabet up or down by a given number of places?

Maximus Cipher

Caesar Cipher

Julius Cipher

Augustus Cipher

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common features of an MDM suite? (pick 4)

Deploy policies to control device security

Monitor device compliance with security standards

Increase battery life and stability

Define, track and deploy software updates

Remote wipe company data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of EndPoint security?

Database software version

Firewall settings

Anti-virus software

Data Encryption tools

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT advisable for avoiding Malware?

Keep data backups

Educate users

Install Antivirus

Downloading software from the internet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?