Search Header Logo

Integrity Concerns Quiz

Authored by Derek DeMers

Computers

9th - 12th Grade

Used 1+ times

Integrity Concerns Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Integrity?

Maintenance of data so as for it to remain constant unless authorized changes are made

Maintenance of data so as for it to change constantly unless authorized changes are made

Maintenance of data so as for it to remain constant unless unauthorized changes are made

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four Integrity concerns?

Replay Attack, Adversary-in-the-middle Attack, Impersonation, and Unauthorized Information Alteration

Replay Attack, Impersonation, Authorized Information Alteration, and Adversary-in-the-middle Attack

Replay Attack, Adversary Attack, Impersonation, and Unauthorized Information Alteration

Replay Attack, Impersonation, Adversary Attack, and Authorized Information Alteration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between an Adversary-in-the-middle Attack and a Replay Attack?

Replay Attack is a type of Adversary-in-the-middle Attack. It steals and sells information transmitted.

Replay Attack is a type of Adversary-in-the-middle Attack. It can only delay information transmitted.

Replay Attack is a type of Adversary-in-the-middle Attack. It repeats or delays information transmitted.

Replay Attack is a type of Adversary-in-the-middle Attack. It can only repeat information transmitted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you limit unauthorized information alteration?

Adversary-in-the-middle

Audit Log

Social Engineering

SSL/TLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one example of impersonation?

Dress as a clown for a job as a party clown

Login using a friends account and hack another computer

Dress up for graduation

Login using your own account and hack another computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you prevent Adversary-in-the-middle Attacks?

Use devices that have certification-based authentication

Use devices that have a certificate of authenticity

Use any device

Use devices that have a certificate award of honor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you prevent Replay Attacks?

Use a website that has www

Use a website that has TLS

Use a website that has SSL

Use a website that has TLS or SSL

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?