Search Header Logo

Protecting Secrets in Cybersecurity

Authored by NUR NADIRAH (AS)

Computers

10th Grade

Used 2+ times

Protecting Secrets in Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between symmetric and asymmetric encryption methods?

Asymmetric encryption is faster for large data.

Symmetric encryption is more efficient.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a one-time password?

A password that is never changed.

A password that changes every 30 seconds.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does MAC stand for in access control?

Managed Access Control

Mandatory Access Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is discretionary access control (DAC)?

A method that grants or restricts object access determined by the object’s owner.

A method that traces actions back to a person.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does role-based access control (RBAC) rely on?

The owner of the object.

The role of the subject.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of authorization in access control?

To determine what a user can do on the network after authentication.

To prevent unauthorized access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are preventative controls?

Controls that stop unwanted or unauthorized activity.

Controls that restore systems after a threat.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?