QuizChapter2

QuizChapter2

University

11 Qs

quiz-placeholder

Similar activities

Computer Network Chapter 1 part 1

Computer Network Chapter 1 part 1

University

15 Qs

06 - Hashing #2

06 - Hashing #2

University

15 Qs

IT Vocabulary Quiz

IT Vocabulary Quiz

8th Grade - University

12 Qs

Seatwork HASH (Data Structure)

Seatwork HASH (Data Structure)

University

10 Qs

Authentication Quiz for learning

Authentication Quiz for learning

University

9 Qs

Cloud Computing

Cloud Computing

University

11 Qs

QUIZ

QUIZ

University

10 Qs

NETWORKING QUIZ

NETWORKING QUIZ

University

15 Qs

QuizChapter2

QuizChapter2

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 2+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What name is given to a storage device connected to a network?

Direct-attached storage (DAS)

network attached storage (NAS)

storage area network (SAN)

Redundant array of independent disks (RAID)

2.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Media Image

Many of the world’s original hackers were computer hobbyists, programmers and students during the 60’s?

TRUE

FALSE

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Write down 1 of the 3 foundational principles of the cybersecurity domain.​ ​

confidentiality

Habits

availability

Anti-virus

integrity

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

What are the three states of data? (Choose three.)

at rest

encrypted

in-process

in-transit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is a met​​hod of sending information from one device to another using removable media?

Googling
Ask Sirui
Handphone
sneaker net, sneakernet

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Which two methods help to ensure data integrity? (Choose two.)

hashing

repudiation

availability

data consistency checks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?