SBIP : CHAPTER 2

SBIP : CHAPTER 2

University

10 Qs

quiz-placeholder

Similar activities

CIS7 Quiz 3 Review

CIS7 Quiz 3 Review

University

15 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Chapter 9

Chapter 9

University

9 Qs

Cryptography

Cryptography

University

15 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

SBIP : CHAPTER 2

SBIP : CHAPTER 2

Assessment

Quiz

Computers

University

Hard

Created by

NUR (PKT)

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT statement about policy

The authorization of access to data in a network, which is controlled by the network administrator

Document that outlines specific requirements or rules that must be met

The level of protection of transmitted data from passive attacks

Strong walls, well-guarded door to secure access – closed network

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the CORRECT Policy Requirements​ ​ ​ ​

Identifications and Aunthentication
Access Control
Network Port
Decryption

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the suitable PASSWORD REQUIREMENTS

Minimum length is 12 characters

Store password using irreversible encryption

Minimum complexity

Maximum length is 14 characters

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the Security Procedures

User Management Procedures

System Administration Procedure

Incident Response Procedure

Configuration Management Procedure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"the process of encoding messages or information in such a way that only authorized parties can access it" Select the SUITABLE cryptographic terminologies

Cipher Text

Encryption

Decryption

Cryptanalysis

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify common communication encryption types

Symmetric Encryption

Asymmetric Encryption

Hash Encoding

White Encoding

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the INCORRECT statement about Hash Encoding

transformation of a string of characters into a usually shorter fixed-length value

used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key

computerized cryptography using a singular encryption key to guise an electronic message

where keys come in pairs. What one key encrypts, only the other can decrypt

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?