Chapter 5 Cybersecurity

Chapter 5 Cybersecurity

University

10 Qs

quiz-placeholder

Similar activities

GUESS THE ANSWER

GUESS THE ANSWER

University

10 Qs

Generalidades OBC

Generalidades OBC

University

15 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Hệ Điều Hành Của Máy Tính

Hệ Điều Hành Của Máy Tính

10th Grade - University

10 Qs

FSA,DFA dan NFA

FSA,DFA dan NFA

University

15 Qs

Node.js

Node.js

University

10 Qs

Parcial - Módulo IV

Parcial - Módulo IV

1st Grade - University

15 Qs

Habilidades digitales

Habilidades digitales

University

15 Qs

Chapter 5 Cybersecurity

Chapter 5 Cybersecurity

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Ria Castillo

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 3 pts

What are three validation criteria used for a validation rule? (Choose three.)

type

format

key

range

size

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Install the program on individual computers.

Turn off antivirus on all the computers.

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

Encrypt the program and require a password after it is downloaded.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the standard for a public key infrastructure to manage digital certificates?

x.503

NIST-SP800

PKI

x.509

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of CSPRNG?

to prevent a computer from being a zombie

to generate salt

to secure a web site

to process hash lookups

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strength of using a hashing function?

It has a variable length output.

Two different files can be created that have the same output.

It is a one-way function and not reversible.

It can take only a fixed length message.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Algorithm that produces a 128-bit hash value

MD5

SHA

RSA

PKI

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A _________________ attack uses a file containing common words, phrases, and passwords.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?