|
1. Which of the following methods is used to check the integrity of data?
|
bet | 1/3 | Sana | 22.08.2023 | Hajmi | 16.87 Kb. | | #79213 |
Bog'liq Introduction to Cybersecurity Module 1 INFORMATIKA JAMLANMA 2022 tushganlar, Etiket kásip ruwxıylıǵınıń sırtqı mazmunı sıpatında., mahmudova-gulruh-zokir-qizi-mustaqil-ish, @IELTSmaterials N1 IELTS Reading (3), 2-O`quv topshiriq (1), sarvar 61, iclud, ILIM ZIYO matematiha , 11, Amonova Mahliyo Safarovna, 2-sinf Ona tili Shaxs va narsaning nomini bildirgan so’zlar dars ishlanma, 9-май Гулнора Азимова, BOSHLAN INTERFAOL METOD, Mantiqiy fiklash
Introduction to Cybersecurity Module 1: Introduction to Cybersecurity Quiz Answers.
1. Which of the following methods is used to check the integrity of data?
Backup
Hashes or checksums
Encryption
Authentication
Explanation: Integrity ensures that system information or processes are protected from intentional or accidental modification. One way to ensure integrity is to use a hash function or checksum.
2. Which of the following statements describes cyberwarfare?
Cyberwarfare is an attack carried out by a group of script kiddies
Cyberwarfare is simulation software for Air Force pilots that allows them to practice under a simulated war scenario
Cyberwarfare is a series of personal protective equipment developed for soldiers involved in nuclear war
Cyberwarfare is an Internet-based conflict that involves the penetration of information systems of other nations
Explanation: Cyberwarfare, as its name suggests, is the use of technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services, such as shutting down a power grid.
3. Which of the following methods can be used to ensure confidentiality of information? (Choose three correct answers)
Explanation: Methods to ensure confidentiality include data encryption, identity proofing and two factor authentication.
4. Which of the following pieces of information would be classified as personal data? (Select three correct answers)
|
| |