CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Expert System

Expert System

8th - 12th Grade

11 Qs

Information Management

Information Management

12th Grade

10 Qs

Visual Basic Basics!

Visual Basic Basics!

9th - 12th Grade

8 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

Unit 9 & 10 review

Unit 9 & 10 review

10th - 11th Grade

7 Qs

Reconnaissance - Short Quiz

Reconnaissance - Short Quiz

9th - 12th Grade

10 Qs

CIA Triad & Digital Security

CIA Triad & Digital Security

11th Grade

13 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

CCST Security and Privacy Concepts - Chapter 18

CCST Security and Privacy Concepts - Chapter 18

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Alicia Pierce

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step in AAA verifies a user’s ability to use a specific resource?

Authorization

Authentication

Accounting

Auditing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process of removing, adding, or altering data to make identifying individuals more challenging?

Suppression

Clearing

Obfuscation

Deidentification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shift left means bringing ________ and __________ into the design, testing, and deployment phases of network engineering.

wireless, wired

security, privacy

development, operations

operations, cloud

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which privacy process inserts or replaces existing information with false information instead of stripping or suppressing data?

Data obfuscation

Noise injection

Privatization

Data distortion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ breaks data into several sets that are separately accessed.

Stripping

Fragmenting

Partitioning

Separating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ describes an operator’s confidence that data has not been intentionally or unintentionally altered while stored or processed.

Integrity

Confidentiality

Authorization

Unfettered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is any piece of information or collection of information that can identify an individual user.

PIT

PRC

PII

PIE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ describes the steps a user must pass through to access resources.

APT

ACR

ALT

AAA