Search Header Logo

Information Security Final Review

Authored by Trevor Bakker

Computers

University

Used 22+ times

Information Security Final Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is DKIM?

DomainKeys Identified Mail

Domain Key Infrastructure Management

Distributed Key Infrastructure Management

DBMS KeyUser Identified Mail

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

  1. List four functions supported by S/MIME.

Enveloped Data

Signed Data

Clear-signed Data

Signed and Enveloped Data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is S/MIME

Secure/Multipurpose Internet Mail Extensions

Secure Mitigate Invasion Mime Explosion

Secure Multipart Internet Mail Extensions

Secure Mail Internet Mail Exchange

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. https is port?

80

443

22

20

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DKIM Is

A specification for cryptographically signing e-mail messages

A specification for DNSSEC

DKARDASHIAN

A specification for key infrastructure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bell-Lapadula is concerned with?

Integrity

Confidentiality

Availability

Non-repudiation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bia model is concerned with

Integrity

Confidentiality

Availability

Non-repudiation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?