SBIP : CHAPTER 2

SBIP : CHAPTER 2

University

10 Qs

quiz-placeholder

Similar activities

The AI Shield

The AI Shield

University

15 Qs

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

PROBLEM SOLVING USING R  UNIT I  MCQS

PROBLEM SOLVING USING R UNIT I MCQS

University

15 Qs

Quiz on Basics of C

Quiz on Basics of C

University

10 Qs

استعني علي الشقا بالله

استعني علي الشقا بالله

University

10 Qs

PYTHON_CHAPTER 6

PYTHON_CHAPTER 6

University

10 Qs

Google Prof Cloud Network - pt 6

Google Prof Cloud Network - pt 6

University

15 Qs

CHAPTER 5 ONLINE QUIZ

CHAPTER 5 ONLINE QUIZ

University

9 Qs

SBIP : CHAPTER 2

SBIP : CHAPTER 2

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

NUR (PKT)

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT statement about policy

The authorization of access to data in a network, which is controlled by the network administrator

Document that outlines specific requirements or rules that must be met

The level of protection of transmitted data from passive attacks

Strong walls, well-guarded door to secure access – closed network

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the CORRECT Policy Requirements​ ​ ​ ​

Identifications and Aunthentication
Access Control
Network Port
Decryption

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the suitable PASSWORD REQUIREMENTS

Minimum length is 12 characters

Store password using irreversible encryption

Minimum complexity

Maximum length is 14 characters

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the Security Procedures

User Management Procedures

System Administration Procedure

Incident Response Procedure

Configuration Management Procedure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"the process of encoding messages or information in such a way that only authorized parties can access it" Select the SUITABLE cryptographic terminologies

Cipher Text

Encryption

Decryption

Cryptanalysis

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify common communication encryption types

Symmetric Encryption

Asymmetric Encryption

Hash Encoding

White Encoding

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the INCORRECT statement about Hash Encoding

transformation of a string of characters into a usually shorter fixed-length value

used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key

computerized cryptography using a singular encryption key to guise an electronic message

where keys come in pairs. What one key encrypts, only the other can decrypt

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?