CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Unit 9 & 10 review

Unit 9 & 10 review

10th - 11th Grade

7 Qs

Python L2

Python L2

10th - 11th Grade

10 Qs

S2 Programming Summary

S2 Programming Summary

1st - 9th Grade

10 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

TUGAS  2 SHARED HOSTING (DATABASE ) 1-9-2021 12TKJ2

TUGAS 2 SHARED HOSTING (DATABASE ) 1-9-2021 12TKJ2

12th Grade

12 Qs

Data Validation

Data Validation

KG - Professional Development

11 Qs

Manejo Terminal Linux

Manejo Terminal Linux

3rd Grade - University

10 Qs

PENGENALAN SISTEM KOMPUTER

PENGENALAN SISTEM KOMPUTER

10th Grade

10 Qs

CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Alicia Pierce

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step in AAA verifies a user’s ability to use a specific resource?

Authorization

Authentication

Accounting

Auditing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of removing, adding, or altering data to make identifying individuals more challenging?

Suppression

Clearing

Obfuscation

Deidentification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shift left means bringing ________ and __________ into the design, testing, and deployment phases of network engineering.

wireless, wired

security, privacy

development, operations

operations, cloud

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which privacy process inserts or replaces existing information with false information instead of stripping or suppressing data?

Data obfuscation

Noise injection

Privatization

Data distortion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ breaks data into several sets that are separately accessed.

Stripping

Fragmenting

Partitioning

Separating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ describes an operator’s confidence that data has not been intentionally or unintentionally altered while stored or processed.

Integrity

Confidentiality

Authorization

Unfettered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is any piece of information or collection of information that can identify an individual user.

PIT

PRC

PII

PIE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ describes the steps a user must pass through to access resources.

APT

ACR

ALT

AAA