Chapter 5 Cybersecurity

Chapter 5 Cybersecurity

University

10 Qs

quiz-placeholder

Similar activities

QUIZ 3- BAEN/ITED

QUIZ 3- BAEN/ITED

University

10 Qs

operating systems

operating systems

University

15 Qs

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

Data Security

Data Security

University

15 Qs

DBMS

DBMS

University

10 Qs

Computing Y7 Lesson4 Quiz

Computing Y7 Lesson4 Quiz

12th Grade - University

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

Chapter 5 Cybersecurity

Chapter 5 Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

Ria Castillo

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 3 pts

What are three validation criteria used for a validation rule? (Choose three.)

type

format

key

range

size

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Install the program on individual computers.

Turn off antivirus on all the computers.

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

Encrypt the program and require a password after it is downloaded.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

x.503

NIST-SP800

PKI

x.509

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of CSPRNG?

to prevent a computer from being a zombie

to generate salt

to secure a web site

to process hash lookups

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strength of using a hashing function?

It has a variable length output.

Two different files can be created that have the same output.

It is a one-way function and not reversible.

It can take only a fixed length message.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Algorithm that produces a 128-bit hash value

MD5

SHA

RSA

PKI

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _________________ attack uses a file containing common words, phrases, and passwords.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?