Search Header Logo

CSF - Chapter 2 2024

Information Technology (IT)

6th Grade

Used 7+ times

CSF - Chapter 2 2024
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What name is given to a storage device connected to a network?

DAS

NAS

Cloud

RAID

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is a method of sending information from one device to another using removable media?

wireless

infrared

sneaker net

wired

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

What are two common hash functions? (Choose two.)

MD5

Blowfish

RC4

ECC

SHA

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

something you have

something you know

something you are

something you do

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

confidentiality

privacy

nonrepudiation

authentication

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

authentication

biometric

token

authorization

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

What are the three foundational principles of the cybersecurity domain? (Choose three.)

integrity

availability

security

confidentiality

encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?