
Cyber 2 EOC Stuff
Quiz by Kathy Sinardi
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
35 questions
Show answers
- Q1Set of permissions attached to an objectAccess control listRightsAuthorization ListProperties30s
- Q2What does CIA stand for?Confidentiality,Integration, AvailabilityConfidentiality, Integrity, AvailabilityConfidentiality, Integrity, AuthenticationControls, Integration, Authorization30s
- Q3The strongest technology that would assure Alice that Bob is the sender of a message is a(n)digital signaturedigital certificateencrypted signaturedigest30s
- Q4______________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integritydigital digestsdigital certificatesdigital signaturesSession keys30s
- Q5the framework for all the policies involved in digital certificatesTrusted Authority (TA)Certificate Revocation List (CRL)Certificate Authority (CA)Public Key Infrastructure (PKI)30s
- Q6One of the most widely used crytographic transport methodsTCPSSHSSLPKI30s
- Q7Modern versions of the ______________ are a more secure alternate to ______________SSL, TLSSSH, TLSTLS, SSHTLS, SSL30s
- Q8A ____________ is the user's public key that has been digitally signed by a trusted third party who verifies the owner and that the public key belongs to that owner.Digital digestDigital certificateMessage digestDigital signature30s
- Q9An entity that issues digital certificates for othersCRPCertificate AuthorityRegistration AuthorityCRL30s
- Q10Personal digital certificates are issues by and RA to individuals primarily for the use ofcreating public keysprotecting email correspondencecreating private keysissuing key revocations30s
- Q11Revoked digital certificates are listed in aPKICRLOCSPCA30s
- Q12An encrypted alternate to the Telnet protocol used to access remote devicesTLSMACSSHSSL30s
- Q13A subordinate entity designed to handle tasks such as authenticating revocation requests, obtaining public keys from subscribers, identifying and authenticating subscribersPARACAACL30s
- Q14Proving a sender sent an email is known asconfidentialitynon-repudiationauthenticationavailability30s
- Q15A ____________ is used for integritystreamalgorythmhashkey30s