
Cybersecurity Unit 1 Review Part 2
Authored by Nathan Krahn
Computers
12th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
74 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is essential in forensic analysis with information and data to ensure there is no doubt that it was tampered with?
Non-repudiation
Encryption
Data masking
Data compression
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What must be available to verify the earliest state of the data in digital forensics?
Encryption key
Provenance
Data masking
Data compression
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the AAA Framework used to understand?
Security surrounding the accessibility of individuals
Network performance
Data encryption methods
Software development processes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a part of the AAA Framework's process of identification?
Authentication
Authorization
Accounting
Auditing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a knowledge-based method for authentication?
Key cards
Fingerprint recognition
Passwords
Tokens
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of authentication method involves the use of key cards, tokens, or smart cards?
Knowledge-based
Possession-based
Biometric
Multi-factor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a biometric method of authentication?
Security questions
Key cards
Fingerprint recognition
Passwords
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?