TcP252_k32_FQ1

TcP252_k32_FQ1

University

12 Qs

quiz-placeholder

Similar activities

cybersecurity-common security infrastructure security

cybersecurity-common security infrastructure security

University

15 Qs

PRE2 - Sw1

PRE2 - Sw1

University

15 Qs

DB-Quiz1

DB-Quiz1

University

10 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

QUIZ 3: SECURITY TOOLS and  VULNERABILITY ANALYSIS

QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

University

11 Qs

UTS - SIB

UTS - SIB

University

17 Qs

TcP252_k32_FQ1

TcP252_k32_FQ1

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

rommel adricula

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

A type of cryptography where it generates one private and one public key.

2.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

It refers to the additional random string of characters before hashing.

3.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

It is an exposure to danger or possible harm.

4.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

A set of policies and procedures for managing an organization's sensitive data.

5.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

It refers to the accuracy, consistency, and reliability of data stored in a database.

6.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

Refers to the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificates

7.

MULTIPLE SELECT QUESTION

10 sec • 4 pts

What best describes REFERENTIAL INTEGRITY? Pick two.

focuses on records

focuses on tables

focuses on Primary Key

focuses in Foreign Key

focuses on column

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?