
CISSP-3-3
Authored by dd disuza
Mathematics
1st - 5th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. (3.5.15) What is VM sprawl?
A. A large collection of virtualized environments
B. A situation where an administrator loses control of VM machines on a network
C. A virtualized infrastructure
D. Cold VM
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When comparing the NIST and ISO cloud characteristics, the ISO/IEC 17788 adds an additional essential cloud characteristic that NIST does not list. Which one of these does ISO include?
A. Measured service
B. Pooling
C. Network access
D. Multi-tenancy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement about embedded systems best describes their security risks?
A. Because they use industry-standard processors, software, and communications systems, they are usually low risk.
B. Their use of proprietary technologies and designs makes them higher risk
. C. They have low physical security risks. .
D. Their use of proprietary technologies and designs makes it harder for attackers to discover and exploit their vulnerabilities
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cloud computing has many advantages but can introduce latency; to reduce this, edge and fog computing architectures can be used. Which statement best describes the difference between edge and fog computing architectures?
A. Fog computing occurs directly onto the sensor-attached devices.
B. Edge computing occurs directly onto the sensor-attached devices.
C. Edge computing decouples hardware and applications.
D. Essentially, they are the same.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is true?
A. Encryption converts plaintext to ciphertext using a commonly (publicly) known system and requires a key.
B. Encoding converts plaintext to another commonly (publicly) known format.
C. Enciphering converts plaintext to ciphertext using a commonly (publicly) known system and requires a key
. D. Steganography converts plaintext to ciphertext using a commonly (publicly) known system
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a symmetric key system where an organization has 20,000 users, how many keys need to be generated?
A. 20,000
B. 40,000
C. 200,000
D. 199,990,000
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetrical encryption has the highest strength per bit of key length?
A. Diffie-Hellman-Merkle
B. ElGamal
C. ECC (Elliptical Curve Cryptography)
D. RSA (Rivest-Shamir-Adleman)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Mathematics
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
18 questions
Comparing Fractions with same numerator or denominator
Quiz
•
3rd Grade
16 questions
Interpreting Line Graphs & Double Tables
Quiz
•
4th Grade