Search Header Logo

CISSP-3-3

Authored by dd disuza

Mathematics

1st - 5th Grade

Used 1+ times

CISSP-3-3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. (3.5.15) What is VM sprawl?

A. A large collection of virtualized environments

B. A situation where an administrator loses control of VM machines on a network

C. A virtualized infrastructure

D. Cold VM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When comparing the NIST and ISO cloud characteristics, the ISO/IEC 17788 adds an additional essential cloud characteristic that NIST does not list. Which one of these does ISO include?

A. Measured service

B. Pooling

C. Network access

D. Multi-tenancy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement about embedded systems best describes their security risks?

A. Because they use industry-standard processors, software, and communications systems, they are usually low risk.

B. Their use of proprietary technologies and designs makes them higher risk

. C. They have low physical security risks. .

D. Their use of proprietary technologies and designs makes it harder for attackers to discover and exploit their vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cloud computing has many advantages but can introduce latency; to reduce this, edge and fog computing architectures can be used. Which statement best describes the difference between edge and fog computing architectures?

A. Fog computing occurs directly onto the sensor-attached devices.

B. Edge computing occurs directly onto the sensor-attached devices.

C. Edge computing decouples hardware and applications.

D. Essentially, they are the same.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true?

A. Encryption converts plaintext to ciphertext using a commonly (publicly) known system and requires a key.

B. Encoding converts plaintext to another commonly (publicly) known format.

C. Enciphering converts plaintext to ciphertext using a commonly (publicly) known system and requires a key

. D. Steganography converts plaintext to ciphertext using a commonly (publicly) known system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a symmetric key system where an organization has 20,000 users, how many keys need to be generated?

A. 20,000

B. 40,000

C. 200,000

D. 199,990,000

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetrical encryption has the highest strength per bit of key length?

A. Diffie-Hellman-Merkle

B. ElGamal

C. ECC (Elliptical Curve Cryptography)

D. RSA (Rivest-Shamir-Adleman)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?