Cybersecurity Ess

Cybersecurity Ess

University

10 Qs

quiz-placeholder

Similar activities

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

Java variables

Java variables

University

10 Qs

NWC 6.1

NWC 6.1

University

6 Qs

science day competition(Networks & Information Security)

science day competition(Networks & Information Security)

University

15 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

PowerShell and Windows Server

PowerShell and Windows Server

12th Grade - Professional Development

10 Qs

Data Warehouse

Data Warehouse

University

10 Qs

Quiz E-Safety and Dugital Safeguarding

Quiz E-Safety and Dugital Safeguarding

University

5 Qs

Cybersecurity Ess

Cybersecurity Ess

Assessment

Quiz

Computers

University

Hard

Created by

Joan Lim

Used 10+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the acronym IoE represent?

Intermediate into Everything

Internet of Everything

Intelligence on Everything

Internet of Everyday

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the term vulnerability mean?

a potential threat that a hacker creates

a known target or victim machine

a weakness that makes a target susceptible to an attack

a method of attack to exploit a target

3.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are the three states of data? (Choose three.)

in-transit

at rest

encrypted

in-process

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are two common hash functions? (Choose two.)

MD5

RSA

SHA

Phishing

Answer explanation

SHA and MD5 use use complex mathematical algorithms to compute hash values.

5.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which two methods help to ensure data integrity? (Choose two.)

data consistency checks

repudiation

availability

hashing

Answer explanation

Data integrity systems include one of the two data integrity methods.

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

Something you know

Something you do

Something you have

Something you are

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a rootkit modify?

Programs

Antivirus

Microsoft Word

OS

Answer explanation

A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?