Search Header Logo

Chapter 8 Quiz II

Authored by Ardita Forografi

Information Technology (IT)

University

Used 1+ times

Chapter 8 Quiz II
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

Implementation

Software

Input

Administrative

Data security

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements about passwords is not true?

A user's actions with respect to passwords can compromise security.

Passwords can be sniffed when being transmitted over a network.

Authentication cannot be established by the use of a password.

Passwords can be stolen through social engineering.

Password systems that are too rigorous may hinder employee productivity.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements about blockchain is not true?

Each block in a blockchain is connected to all the blocks before and after it.

Blockchain is vulnerable in some of the same ways as conventional, centralized record-keeping systems.

Once recorded, a blockchain transaction cannot be changed.

The data represented in a blockchain is maintained in a central database. 

The records in a blockchain are secured through cryptography.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

DPI

PKI

UTM

NSP

MSSP

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A NAT conceals the IP addresses of the organization's internal host computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems.

True

False

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Public key encryption uses one key.

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Symmetric encryption is more secure than public key encryption.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?