Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

quiz-placeholder

Similar activities

Microsoft Office Advandces 2016

Microsoft Office Advandces 2016

9th Grade - Professional Development

20 Qs

Computer basics for beginners

Computer basics for beginners

Professional Development

15 Qs

unit test i sem jamia

unit test i sem jamia

Professional Development

20 Qs

Ms Word, Ms Excel

Ms Word, Ms Excel

Professional Development

12 Qs

Random stuff

Random stuff

KG - Professional Development

12 Qs

Guess the Retro Computer 1

Guess the Retro Computer 1

KG - Professional Development

13 Qs

Unit 1 lesson 1

Unit 1 lesson 1

University - Professional Development

15 Qs

Level 2 Digital Technologies

Level 2 Digital Technologies

8th Grade - Professional Development

18 Qs

Cyber Quiz

Cyber Quiz

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Dove Soap

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the best definition of personally identifiable information (PII)?

Data that is collected from servers and web browsers using cookies in order to track a customer

Data that is collected by businesses to track the digital behaviors of customers

Data that is collected by businesses to distinguish identities of individuals

Data that is collected from servers and websites for anonymous browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

   ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt

read, write, execute

read only

full access

read, write

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

server

intermediary

client

secondary

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

AES

ESP

MD5

IPsec

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which layer of the hierarchical design model is a control boundary between the other layers?

core

network

access

distribution

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which access control model allows users to control access to data as an owner of that data?

attribute-based access control

mandatory access control

discretionary access control

nondiscretionary access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

nonrepudiation

authentication

integrity

confidentiality

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?