CSF Additional Quiz - Chapter 4

CSF Additional Quiz - Chapter 4

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cryptocurrency quiz

Cryptocurrency quiz

Professional Development

10 Qs

CN chapter 5 - Additional questions

CN chapter 5 - Additional questions

Professional Development

20 Qs

Information System Administration Quiz in english

Information System Administration Quiz in english

Professional Development

20 Qs

Quiz for Traning

Quiz for Traning

Professional Development

16 Qs

EMM

EMM

Professional Development

10 Qs

Mobile, Linux, and macOS Operating Systems

Mobile, Linux, and macOS Operating Systems

12th Grade - Professional Development

10 Qs

Chapter 4

Chapter 4

Professional Development

10 Qs

PNPKI User's Training

PNPKI User's Training

Professional Development

10 Qs

CSF Additional Quiz - Chapter 4

CSF Additional Quiz - Chapter 4

Assessment

Quiz

Other

Professional Development

Medium

Created by

Chin Siong Hong

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of cryptography?

To create secret codes for historical documents

To control access to buildings and rooms

To encrypt or decrypt information for secure storage and transmission

To generate one-time passwords for authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method uses the same key for both encryption and decryption?

Asymmetric key cryptography

Transposition

Symmetric key cryptography

Public-key encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between symmetric and asymmetric encryption?

Symmetric encryption is faster but less secure than asymmetric encryption

Asymmetric encryption uses the same key for both encryption and decryption

Symmetric encryption uses a pair of unrelated keys

Asymmetric encryption is more efficient for encrypting large blocks of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is commonly used in the electronic payment industry?

AES

RSA

3DES

Blowfish

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a virtual private network (VPN)?

To encrypt messages using the Caesar cipher

To control access to a building or system

To provide online privacy and anonymity by creating a secure connection

To generate one-time passwords for authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Physical Access Control primarily focus on?

Authenticating users

Restricting access to physical spaces

Managing data encryption

Monitoring network traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of Logical Access Control?

Security alarms

Motion detectors

Password-coded doors

Fob-controlled gates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?