CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Network Security

Network Security

9th Grade

13 Qs

BTEC DIT C1 LAA - What are User Interfaces?

BTEC DIT C1 LAA - What are User Interfaces?

10th Grade

11 Qs

HTML forms

HTML forms

11th Grade - University

10 Qs

Computer Hardware - Storage Devices

Computer Hardware - Storage Devices

2nd - 12th Grade

11 Qs

Software - Functions of the Operating System

Software - Functions of the Operating System

5th - 12th Grade

9 Qs

Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

10th Grade

8 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Alicia Pierce

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step in AAA verifies a user’s ability to use a specific resource?

Authorization

Authentication

Accounting

Auditing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of removing, adding, or altering data to make identifying individuals more challenging?

Suppression

Clearing

Obfuscation

Deidentification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shift left means bringing ________ and __________ into the design, testing, and deployment phases of network engineering.

wireless, wired

security, privacy

development, operations

operations, cloud

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which privacy process inserts or replaces existing information with false information instead of stripping or suppressing data?

Data obfuscation

Noise injection

Privatization

Data distortion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ breaks data into several sets that are separately accessed.

Stripping

Fragmenting

Partitioning

Separating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ describes an operator’s confidence that data has not been intentionally or unintentionally altered while stored or processed.

Integrity

Confidentiality

Authorization

Unfettered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is any piece of information or collection of information that can identify an individual user.

PIT

PRC

PII

PIE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ describes the steps a user must pass through to access resources.

APT

ACR

ALT

AAA