016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

12th Grade

15 Qs

quiz-placeholder

Similar activities

Chapter 4: The Art of Protecting Secrets Quiz

Chapter 4: The Art of Protecting Secrets Quiz

12th Grade

20 Qs

Data

Data

12th Grade

20 Qs

Adobe photoshop True False Chapter 2.1

Adobe photoshop True False Chapter 2.1

9th - 12th Grade

12 Qs

Computer Language Quiz

Computer Language Quiz

9th Grade - University

16 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

Garden State Cybersecurity - Unit 4.1 - 4.2

Garden State Cybersecurity - Unit 4.1 - 4.2

9th - 12th Grade

14 Qs

Cybersecurity Scenarios

Cybersecurity Scenarios

12th Grade

10 Qs

Malware and Encryption Quiz

Malware and Encryption Quiz

12th Grade

20 Qs

016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

Assessment

Quiz

Computers

12th Grade

Easy

DOK Level 1: Recall

Standards-aligned

Created by

Quizizz Content

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Companies must make clear what they are doing with the personal information is a part of

Statement of Notice

Privacy Policy

Data Protection Act

Terms of Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method of steganography? Audio & Video Steganography, Network Traffic Steganography, Image Steganography

Data Masking

Audio & Video Steganography

Network Traffic Steganography

Image Steganography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'steganography' mean?

Hidden writing

Visible writing

Encrypted text

Public message

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security advantage of tokenization?

Tokens can be easily reused if intercepted.

Tokens cannot be reused if intercepted.

Tokens are always encrypted during transmission.

Tokens are stored in plain text for easy access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Token-based authentication typically uses which of the following?

A physical device

A knowledge of personal information

A biometric scan

A password

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In data masking, which of the following is a common technique?

Encrypting the entire data

Deleting the data

Using asterisks to replace parts of the number

Compressing the data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Steganography?

A way of concealing text.

A method of data encryption.

A technique for data compression.

A form of digital art.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?