CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

University

10 Qs

quiz-placeholder

Similar activities

Teste 1 - Inteligência Artificial

Teste 1 - Inteligência Artificial

University

10 Qs

Programación en HTML 1 con Codepen 10°

Programación en HTML 1 con Codepen 10°

10th Grade - University

14 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

BB

BB

University

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

STM10163_T1:INTRODUCTION TO DATABASE CONCEPT

STM10163_T1:INTRODUCTION TO DATABASE CONCEPT

University

10 Qs

Computational Thinking in Python[Quiz 3]

Computational Thinking in Python[Quiz 3]

University

15 Qs

CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

N_ Z

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cloud security involves a set of policies, technologies, and controls to protect cloud-based systems, data, and infrastructure.

False

True

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

CIA stands for

Confidentiality, individually and availability

Confidentiality, integrity and accessibility

Confidentiality, integrity and availability

Correctively, integrity and availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Symmetric and Asymmetric is a 2 types of

Public Key password

Hashing

HTTPS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which of the following is an example of public key Infrastructure

An e-commerce site uses a CA-issued SSL certificate to prove its identity and encrypt customer transactions.

A website uses PKI to issue SSL/TLS certificates for secure HTTPS connections.

A bank encrypts customer transactions using AES to ensure secure payments in cloud-based applications.

A cloud provider digitally signs software updates to confirm authenticity before installation.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Public Key Infrastructure (PKI) is A system that manages encryption keys and digital certificates and it

is a method for managing user passwords.
is a type of hardware used for data storage.

Ensures secure communication between users and services.

is a protocol for secure email communication.

6.

FILL IN THE BLANK QUESTION

1 min • 15 pts

Certificate Authority (CA) helps establish _____ between a user and a cloud service.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hashing is a process

that converts data into a fixed-length hash value.

that converts data into a flexible-length hash value

that converts data into a readeable hash value

that converts data into an encrypted-length hash value

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers