CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

University

10 Qs

quiz-placeholder

Similar activities

computer Networks

computer Networks

University

10 Qs

Tes Awal Modul 5

Tes Awal Modul 5

University

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

DCN5511: Chapter 5 - 7

DCN5511: Chapter 5 - 7

University

15 Qs

Structured/Traditional SDM

Structured/Traditional SDM

University

9 Qs

 QUIZ  MS Core Java Quiz-3 2023

QUIZ MS Core Java Quiz-3 2023

University

11 Qs

QUIZ GAME

QUIZ GAME

University

10 Qs

Teoria General de los Sistemas IF1300

Teoria General de los Sistemas IF1300

University

10 Qs

CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

N_ Z

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cloud security involves a set of policies, technologies, and controls to protect cloud-based systems, data, and infrastructure.

False

True

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

CIA stands for

Confidentiality, individually and availability

Confidentiality, integrity and accessibility

Confidentiality, integrity and availability

Correctively, integrity and availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Symmetric and Asymmetric is a 2 types of

Public Key password

Hashing

HTTPS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which of the following is an example of public key Infrastructure

An e-commerce site uses a CA-issued SSL certificate to prove its identity and encrypt customer transactions.

A website uses PKI to issue SSL/TLS certificates for secure HTTPS connections.

A bank encrypts customer transactions using AES to ensure secure payments in cloud-based applications.

A cloud provider digitally signs software updates to confirm authenticity before installation.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Public Key Infrastructure (PKI) is A system that manages encryption keys and digital certificates and it

is a method for managing user passwords.
is a type of hardware used for data storage.

Ensures secure communication between users and services.

is a protocol for secure email communication.

6.

FILL IN THE BLANK QUESTION

1 min • 15 pts

Certificate Authority (CA) helps establish _____ between a user and a cloud service.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hashing is a process

that converts data into a fixed-length hash value.

that converts data into a flexible-length hash value

that converts data into a readeable hash value

that converts data into an encrypted-length hash value

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers