CASS Introduction Quiz

CASS Introduction Quiz

Professional Development

9 Qs

quiz-placeholder

Similar activities

QMS Internal Audit (Pre-Test)

QMS Internal Audit (Pre-Test)

Professional Development

10 Qs

Part 1 SU 1.4

Part 1 SU 1.4

Professional Development

10 Qs

Web application security

Web application security

Professional Development

10 Qs

Quiz 1 - NTI 2024/2025

Quiz 1 - NTI 2024/2025

Professional Development

10 Qs

CISSP - Einde dag 3

CISSP - Einde dag 3

Professional Development

6 Qs

Security Analyst Training Quiz

Security Analyst Training Quiz

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Cyber Security Fundamental - RK

Cyber Security Fundamental - RK

Professional Development

10 Qs

CASS Introduction Quiz

CASS Introduction Quiz

Assessment

Quiz

Professional Development, Philosophy

Professional Development

Hard

Created by

ahlam ansari

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cryptography can provide

Entity authentication

Nonrepudiation of messages

Confidentiality

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The type of threats on the security of a computer system or network are ……………………..

Interruption

Deception

Fabrication

Modification

Interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use Cryptography term to transforming messages to make them secure and immune to

a. Change

b. Idle

c. Attacks

d. Defend

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use Cryptography term to transforming messages to make them secure and immune to

a. Change

b. Idle

c. Attacks

d. Defend

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.

Connection Integrity without Recovery

Selective-Field Connection Integrity

Connectionless Integrity

Traffic Flow Confidentiality

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ Requires that computer system assets be available to authorized parties when needed.

Integrity

Confidentiality

Authorization

Availability

9.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

SPECIFIC SECURITY MECHANISMS are ___

Encipherment

Digital Signature

Access Control

Event Detection

Discover more resources for Professional Development