Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

TYPES OF COMPUTER

TYPES OF COMPUTER

3rd - 4th Grade

10 Qs

Pre-Assessment: ICT 10 Orientation Day

Pre-Assessment: ICT 10 Orientation Day

10th Grade

10 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

¿Qué se de Office 365?

¿Qué se de Office 365?

Professional Development

12 Qs

Textos y viñetas en Word, 2do grado

Textos y viñetas en Word, 2do grado

2nd Grade

10 Qs

Grade 3 Computer Review

Grade 3 Computer Review

3rd Grade

10 Qs

SECUNDARIA TICS NOVIEMBRE 21

SECUNDARIA TICS NOVIEMBRE 21

8th Grade

10 Qs

Primero Primaria Computación Unidad II

Primero Primaria Computación Unidad II

1st Grade

12 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

Assessment

Quiz

Computers

KG - University

Practice Problem

Easy

Created by

Marcus Phang

Used 60+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method tries all possible passwords until a match is found?

birthday

dictionary

brute force

rainbow tables

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?

valid ID

source code

digital signature

code recognition

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Write down one criteria used for validation rule.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user wants to ensure that when new users downloaded his newly created program, the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Distribute the program on a thumb drive.

Install the program on individual computers.

Encrypt the program and require a password after it is downloaded.

Create a hash of the program file and use it to verify the integrity of the file after download

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

x.509

NIST-SP800

x.503

PKI

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent breach at a company due to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?

weak encryption

bad usernames

poor input validation

lack of operating system patching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strength of using a hashing function?

It has a variable length output.

It can take only a fixed length message.

It is a one-way function and not reversible.

Two different files can be created that have the same output.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?