Computer Security Week 1_Evaluation

Computer Security Week 1_Evaluation

University

15 Qs

quiz-placeholder

Similar activities

Week 4

Week 4

University

15 Qs

Post-Test Creational Design Pattern

Post-Test Creational Design Pattern

University

10 Qs

AI 900 - pt 1

AI 900 - pt 1

University

18 Qs

Data Structures

Data Structures

University

12 Qs

Universal Design Access

Universal Design Access

University

10 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

Managing User Accounts

Managing User Accounts

9th Grade - University

10 Qs

MOC 20744C-Securing Windows Server 2016 - Part 1

MOC 20744C-Securing Windows Server 2016 - Part 1

University

20 Qs

Computer Security Week 1_Evaluation

Computer Security Week 1_Evaluation

Assessment

Quiz

Computers

University

Hard

Created by

Rawia Salih

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the property that involves the protection of data, providing access for those who are allowed to see it while disallowing others from learning anything about its content?

Confidentiality

Authenticity

Availability

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool involves the transformation of information using a secret, called an encryption key, so that the transformed information can only be read using another secret, called the decryption key?

Access control

Encryption

Authorization

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the property that refers to the ability to determine that statements, policies, and permissions issued by persons or systems are genuine?

Anonymity

Authenticity

Integrity

Assurance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary tool for ensuring authenticity in computer systems?

Mixing

Digital signatures

Aggregation

Proxies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the property that involves the ability to determine that certain records or transactions are not attributable to any individual?

Anonymity

Availability

Integrity

Confidentiality

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the interception of information intended for someone else during its transmission over a communication channel called?

Alteration

Masquerading

Eavesdropping

Denial-of-service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle stresses simplicity in the design and implementation of security measures?

Fail-safe defaults

Economy of mechanism

Complete mediation

Open design

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?