CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

9th - 12th Grade

39 Qs

quiz-placeholder

Similar activities

Latihan USEK Teori Produktif TKJ

Latihan USEK Teori Produktif TKJ

12th Grade

40 Qs

Final Long Summative Assessment

Final Long Summative Assessment

12th Grade

40 Qs

TEST BANK: NETWORKS AND DIGITAL SECURITY

TEST BANK: NETWORKS AND DIGITAL SECURITY

9th - 12th Grade

35 Qs

FUNDAMENTALS OF COMPUTING PRETEST

FUNDAMENTALS OF COMPUTING PRETEST

9th - 12th Grade

44 Qs

4.1-4.3 Questions

4.1-4.3 Questions

9th Grade

39 Qs

Trắc nghiệm Microsoft Access

Trắc nghiệm Microsoft Access

11th Grade - University

39 Qs

Net+ 1.1-1.3 Test

Net+ 1.1-1.3 Test

11th Grade

44 Qs

CYB 401: Software and Systems Security: Test 2

CYB 401: Software and Systems Security: Test 2

12th Grade

41 Qs

CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

hash

stream

elliptical

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

3DES

Vignere

AES

Skipjack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

asymmetric

hash

symmetric

one-time pad

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

detective

preventive

masking

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

blanking

=hiding

retracting

whiteout

masking

Answer explanation

Refer to curriculum topic: 4.3.1
Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

The correct answer is: masking

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

guards to monitor security screens

swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

biometrics to validate physical characteristics

firewalls to monitor traffic

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three protocols use asymmetric key algorithms? (Choose four.)

Internet Key Exchange (IKE)

Secure Socket Layer (SSL)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure File Transfer Protocol (SFTP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?