CLI - Basic Security

CLI - Basic Security

University

10 Qs

quiz-placeholder

Similar activities

Chapter 9

Chapter 9

University

9 Qs

Blockchain Basics: Algorithm and Techniques

Blockchain Basics: Algorithm and Techniques

University - Professional Development

12 Qs

Sec+ Terms Domain 2 1/2

Sec+ Terms Domain 2 1/2

University

10 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

Hashing Search - Data Structures

Hashing Search - Data Structures

University

15 Qs

Hash table

Hash table

University

6 Qs

Hashing and Hash Tables

Hashing and Hash Tables

University

9 Qs

CLI - Basic Security

CLI - Basic Security

Assessment

Quiz

Computers

University

Medium

Created by

Nurul Zinni

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cloud security involves a set of policies, technologies, and controls to protect cloud-based systems, data, and infrastructure.

False

True

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

CIA stands for

Confidentiality, individually and availability

Confidentiality, integrity and accessibility

Confidentiality, integrity and availability

Correctively, integrity and availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Symmetric and Asymmetric is a 2 types of

Public Key password

Hashing

HTTPS

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which of the following is an example of public key Infrastructure

An e-commerce site uses a CA-issued SSL certificate to prove its identity and encrypt customer transactions.

A website uses PKI to issue SSL/TLS certificates for secure HTTPS connections.

A bank encrypts customer transactions using AES to ensure secure payments in cloud-based applications.

A cloud provider digitally signs software updates to confirm authenticity before installation.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Public Key Infrastructure (PKI) is A system that manages encryption keys and digital certificates and it

is a method for managing user passwords.
is a type of hardware used for data storage.

Ensures secure communication between users and services.

is a protocol for secure email communication.

6.

FILL IN THE BLANK QUESTION

1 min • 15 pts

Certificate Authority (CA) helps establish _____ between a user and a cloud service.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hashing is a process

that converts data into a fixed-length hash value.

that converts data into a flexible-length hash value

that converts data into a readeable hash value

that converts data into an encrypted-length hash value

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?