016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

12th Grade

15 Qs

quiz-placeholder

Similar activities

Technical Terms - Internet (A-Z) - Spoofing

Technical Terms - Internet (A-Z) - Spoofing

12th Grade

10 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

TPAV AFTER EFFECT

TPAV AFTER EFFECT

12th Grade

10 Qs

Image Steganography Quiz

Image Steganography Quiz

12th Grade

10 Qs

Subnets and IP Routing

Subnets and IP Routing

12th Grade

20 Qs

3.1 DATA

3.1 DATA

12th Grade

10 Qs

Network ID Subnetmask Quiz

Network ID Subnetmask Quiz

12th Grade

10 Qs

Cryptography Quiz

Cryptography Quiz

12th Grade

10 Qs

016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

Assessment

Quiz

Computers

12th Grade

Easy

DOK Level 1: Recall

Standards-aligned

Created by

Wayground Content

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Companies must make clear what they are doing with the personal information is a part of

Statement of Notice

Privacy Policy

Data Protection Act

Terms of Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method of steganography? Audio & Video Steganography, Network Traffic Steganography, Image Steganography

Data Masking

Audio & Video Steganography

Network Traffic Steganography

Image Steganography

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'steganography' mean?

Hidden writing

Visible writing

Encrypted text

Public message

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security advantage of tokenization?

Tokens can be easily reused if intercepted.

Tokens cannot be reused if intercepted.

Tokens are always encrypted during transmission.

Tokens are stored in plain text for easy access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Token-based authentication typically uses which of the following?

A physical device

A knowledge of personal information

A biometric scan

A password

Tags

DOK Level 1: Recall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In data masking, which of the following is a common technique?

Encrypting the entire data

Deleting the data

Using asterisks to replace parts of the number

Compressing the data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Steganography?

A way of concealing text.

A method of data encryption.

A technique for data compression.

A form of digital art.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?