placeholder image to represent content

Cyber 2 EOC Stuff

Quiz by Kathy Sinardi

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
35 questions
Show answers
  • Q1
    Set of permissions attached to an object
    Access control list
    Rights
    Authorization List
    Properties
    30s
  • Q2
    What does CIA stand for?
    Confidentiality,Integration, Availability
    Confidentiality, Integrity, Availability
    Confidentiality, Integrity, Authentication
    Controls, Integration, Authorization
    30s
  • Q3
    The strongest technology that would assure Alice that Bob is the sender of a message is a(n)
    digital signature
    digital certificate
    encrypted signature
    digest
    30s
  • Q4
    ______________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity
    digital digests
    digital certificates
    digital signatures
    Session keys
    30s
  • Q5
    the framework for all the policies involved in digital certificates
    Trusted Authority (TA)
    Certificate Revocation List (CRL)
    Certificate Authority (CA)
    Public Key Infrastructure (PKI)
    30s
  • Q6
    One of the most widely used crytographic transport methods
    TCP
    SSH
    SSL
    PKI
    30s
  • Q7
    Modern versions of the ______________ are a more secure alternate to ______________
    SSL, TLS
    SSH, TLS
    TLS, SSH
    TLS, SSL
    30s
  • Q8
    A ____________ is the user's public key that has been digitally signed by a trusted third party who verifies the owner and that the public key belongs to that owner.
    Digital digest
    Digital certificate
    Message digest
    Digital signature
    30s
  • Q9
    An entity that issues digital certificates for others
    CRP
    Certificate Authority
    Registration Authority
    CRL
    30s
  • Q10
    Personal digital certificates are issues by and RA to individuals primarily for the use of
    creating public keys
    protecting email correspondence
    creating private keys
    issuing key revocations
    30s
  • Q11
    Revoked digital certificates are listed in a
    PKI
    CRL
    OCSP
    CA
    30s
  • Q12
    An encrypted alternate to the Telnet protocol used to access remote devices
    TLS
    MAC
    SSH
    SSL
    30s
  • Q13
    A subordinate entity designed to handle tasks such as authenticating revocation requests, obtaining public keys from subscribers, identifying and authenticating subscribers
    PA
    RA
    CA
    ACL
    30s
  • Q14
    Proving a sender sent an email is known as
    confidentiality
    non-repudiation
    authentication
    availability
    30s
  • Q15
    A ____________ is used for integrity
    stream
    algorythm
    hash
    key
    30s

Teachers give this quiz to your class