
CISSP-3-3
Quiz
•
Mathematics
•
1st - 5th Grade
•
Practice Problem
•
Medium

dd disuza
Used 1+ times
FREE Resource
Student preview

9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. (3.5.15) What is VM sprawl?
A. A large collection of virtualized environments
B. A situation where an administrator loses control of VM machines on a network
C. A virtualized infrastructure
D. Cold VM
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When comparing the NIST and ISO cloud characteristics, the ISO/IEC 17788 adds an additional essential cloud characteristic that NIST does not list. Which one of these does ISO include?
A. Measured service
B. Pooling
C. Network access
D. Multi-tenancy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement about embedded systems best describes their security risks?
A. Because they use industry-standard processors, software, and communications systems, they are usually low risk.
B. Their use of proprietary technologies and designs makes them higher risk
. C. They have low physical security risks. .
D. Their use of proprietary technologies and designs makes it harder for attackers to discover and exploit their vulnerabilities
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cloud computing has many advantages but can introduce latency; to reduce this, edge and fog computing architectures can be used. Which statement best describes the difference between edge and fog computing architectures?
A. Fog computing occurs directly onto the sensor-attached devices.
B. Edge computing occurs directly onto the sensor-attached devices.
C. Edge computing decouples hardware and applications.
D. Essentially, they are the same.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is true?
A. Encryption converts plaintext to ciphertext using a commonly (publicly) known system and requires a key.
B. Encoding converts plaintext to another commonly (publicly) known format.
C. Enciphering converts plaintext to ciphertext using a commonly (publicly) known system and requires a key
. D. Steganography converts plaintext to ciphertext using a commonly (publicly) known system
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a symmetric key system where an organization has 20,000 users, how many keys need to be generated?
A. 20,000
B. 40,000
C. 200,000
D. 199,990,000
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetrical encryption has the highest strength per bit of key length?
A. Diffie-Hellman-Merkle
B. ElGamal
C. ECC (Elliptical Curve Cryptography)
D. RSA (Rivest-Shamir-Adleman)
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The X.509 v3 standard introduced support for extensions. What benefit do extensions provide?
A. A way to identify the public key owner
B. A way to include the X.500 name
C. A way to allow user defined extensions for certificates
D. A way to provide a unique identifier
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following cryptanalytic attacks is considered the most successful in practice?
A. Social engineering
B. Side-channel attacks
C. Linear cryptanalysis
D. Chosen ciphertext attack
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
Discover more resources for Mathematics
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
place value
Quiz
•
4th Grade
20 questions
Adding and Subtracting Decimals
Quiz
•
5th Grade
20 questions
Place Value and Rounding
Quiz
•
4th Grade
20 questions
Division Facts
Quiz
•
3rd Grade
10 questions
Multiplying Fractions
Quiz
•
5th Grade