Tổng hơp 10 câu hỏi trắc nghiệm ôn tập môn an toàn thông tin | Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh

Câu 1: Which of the following controls can be used to prevent the disclosure of sensitive information stored on a mobile device’s removable media in the event that the device is lost or stolen? Câu 2: Which of the following concepts describes the use of a one way transformation in order to validate the integrity of a program? Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!

Câu hỏi1
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following controls can be used to prevent the disclosure of
sensitive information stored on a mobile device’s removable media in the
event that the device is lost or stolen?
Câu hỏi 1Select one:
a.
Screen locks
b.
Device password
c.
Encryption
Encryption is used to ensure the confidentiality of information.
d.
Hashing
Phản hồi
Your answer is correct.
The correct answer is: Encryption
Câu hỏi2
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following concepts describes the use of a one way
transformation in order to validate the integrity of a program?
Câu hỏi 2Select one:
a.
Non-repudiation
b.
Key escrow
c.
Steganography
d.
Hashing
Hashing refers to the hash algorithms used in cryptography. It is used to store data,
such as hash tables and its main characteristics are: It must be one-way – it is not
reversible. Variable-length input produces fixed-length output – whether you have two
characters or 2 million, the hash size is the same. The algorithm must have few or no
collisions – in hashing two different inputs does not give the same output.
Phản hồi
Your answer is correct.
The correct answer is: Hashing
Câu hỏi3
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following functions provides an output which cannot be reversed
and converts data into a string of characters?
Câu hỏi 3Select one:
a.
Steganography
b.
Hashing
Hashing refers to the hash algorithms used in cryptography. It is used to store data,
such as hash tables one of its characteristics is that it must be one-way – it is not
reversible
c.
Stream ciphers
d.
Block ciphers
Phản hồi
Your answer is correct.
The correct answer is: Hashing
Câu hỏi4
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
John recently received an email message from Bill. What cryptographic goal would
need to be met to convince John that Bill was actually the sender of the message?
Câu hỏi 4Select one:
a.
Nonrepudiation
b.
Confidentiality
c.
Integrity
d.
Availability
Phản hồi
Your answer is correct.
The correct answer is: Nonrepudiation
Câu hỏi5
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Ann would like to forward some Personal Identifiable Information to her HR
department by email, but she is worried about the confidentiality of the
information. Which of the following will accomplish this task securely?
Câu hỏi 5Select one:
a.
Digital Signatures
b.
Secret Key
c.
Hashing
d.
Encryption
Encryption is used to prevent unauthorized users from accessing data. Data encryption
will support the confidentiality of the email.
Phản hồi
Your answer is correct.
The correct answer is: Encryption
Câu hỏi6
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
An organization must implement controls to protect the confidentiality of its
most sensitive data. The company is currently using a central storage system
and group based access control for its sensitive information. Which of the
following controls can further secure the data in the central storage system?
Câu hỏi 6Select one:
a.
Data encryption
b.
Patching the system
c.
File hashing
d.
Digital signatures
Phản hồi
Your answer is correct.
The correct answer is: Data encryption
Câu hỏi7
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
When confidentiality is the primary concern, and a secure channel for key
exchange is not available, which of the following should be used for
transmitting company documents?
Câu hỏi 7Select one:
a.
Asymmetric
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric
keys are referred to as the public key and the private key. Asymmetric algorithms do
not require a
secure channel for the initial exchange of secret keys between the parties.
b.
Digital Signature
c.
Hashing
d.
Symmetric
Phản hồi
Your answer is correct.
The correct answer is: Asymmetric
Câu hỏi8
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is a way to implement a technical control to mitigate
data loss in case of a mobile device theft?
Câu hỏi 8Select one:
a.
.Solid state drive
b.
Disk encryption
c.
Mobile device policy
d.
Encryption policy
Phản hồi
Your answer is correct.
The correct answer is: Disk encryption
Câu hỏi9
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
After copying a sensitive document from his desktop to a flash drive, Joe, a
user, realizes that the document is no longer encrypted. Which of the
following can a security technician implement to ensure that documents
stored on Joe’s desktop remain encrypted when moved to external media or
other network based storage?
Câu hỏi 9Select one:
a.
File level encryption
Encryption is used to ensure the confidentiality of information. In this case you should
make use of file level encryption. File level encryption is a form of disk encryption where
individual files or directories are encrypted by the file system itself. This is in contrast to
full disk encryption where the entire partition or disk, in which the file system resides, is
encrypted.
b.
Database record level encryption
c.
Removable disk encryption
d.
Whole disk encryption
Phản hồi
Your answer is correct.
The correct answer is: File level encryption
Câu hỏi10
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following explains the difference between a public key and a
private key?
Câu hỏi 10Select one:
a.
The public key is only used by the client while the private key is available to all.
Both keys are mathematically related.
b.
The private key is commonly used in symmetric key decryption while the public key is
used in asymmetric key decryption.
c.
The private key only decrypts the data while the public key only encrypts the data.
Both keys are mathematically related.
d.
The private key is only used by the client and kept secret while the public key is
available to all.
The private key must be kept secret at all time. The private key is only by the client.
The public key is available to anybody.
Phản hồi
Your answer is correct.
The correct answer is: The private key is only used by the client and kept secret while
the public key is available to all.
| 1/7

Preview text:

Câu hỏi1 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following controls can be used to prevent the disclosure of
sensitive information stored on a mobile device’s removable media in the
event that the device is lost or stolen?
Câu hỏi 1Select one: a. Screen locks b. Device password c. Encryption
Encryption is used to ensure the confidentiality of information. d. Hashing Phản hồi Your answer is correct.
The correct answer is: Encryption Câu hỏi2 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following concepts describes the use of a one way
transformation in order to validate the integrity of a program?
Câu hỏi 2Select one: a. Non-repudiation b. Key escrow c. Steganography d. Hashing
Hashing refers to the hash algorithms used in cryptography. It is used to store data,
such as hash tables and its main characteristics are: It must be one-way – it is not
reversible. Variable-length input produces fixed-length output – whether you have two
characters or 2 million, the hash size is the same. The algorithm must have few or no
collisions – in hashing two different inputs does not give the same output. Phản hồi Your answer is correct. The correct answer is: Hashing Câu hỏi3 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following functions provides an output which cannot be reversed
and converts data into a string of characters?
Câu hỏi 3Select one: a. Steganography b. Hashing
Hashing refers to the hash algorithms used in cryptography. It is used to store data,
such as hash tables one of its characteristics is that it must be one-way – it is not reversible c. Stream ciphers d. Block ciphers Phản hồi Your answer is correct. The correct answer is: Hashing Câu hỏi4 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
John recently received an email message from Bill. What cryptographic goal would
need to be met to convince John that Bill was actually the sender of the message? Câu hỏi 4Select one: a. Nonrepudiation b. Confidentiality c. Integrity d. Availability Phản hồi Your answer is correct.
The correct answer is: Nonrepudiation Câu hỏi5 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Ann would like to forward some Personal Identifiable Information to her HR
department by email, but she is worried about the confidentiality of the
information. Which of the following will accomplish this task securely?
Câu hỏi 5Select one: a. Digital Signatures b. Secret Key c. Hashing d. Encryption
Encryption is used to prevent unauthorized users from accessing data. Data encryption
will support the confidentiality of the email. Phản hồi Your answer is correct.
The correct answer is: Encryption Câu hỏi6 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
An organization must implement controls to protect the confidentiality of its
most sensitive data. The company is currently using a central storage system
and group based access control for its sensitive information. Which of the
following controls can further secure the data in the central storage system?
Câu hỏi 6Select one: a. Data encryption b. Patching the system c. File hashing d. Digital signatures Phản hồi Your answer is correct.
The correct answer is: Data encryption Câu hỏi7 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
When confidentiality is the primary concern, and a secure channel for key
exchange is not available, which of the following should be used for
transmitting company documents?
Câu hỏi 7Select one: a. Asymmetric
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric
keys are referred to as the public key and the private key. Asymmetric algorithms do not require a
secure channel for the initial exchange of secret keys between the parties. b. Digital Signature c. Hashing d. Symmetric Phản hồi Your answer is correct.
The correct answer is: Asymmetric Câu hỏi8 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is a way to implement a technical control to mitigate
data loss in case of a mobile device theft?
Câu hỏi 8Select one: a. .Solid state drive b. Disk encryption c. Mobile device policy d. Encryption policy Phản hồi Your answer is correct.
The correct answer is: Disk encryption Câu hỏi9 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
After copying a sensitive document from his desktop to a flash drive, Joe, a
user, realizes that the document is no longer encrypted. Which of the
following can a security technician implement to ensure that documents
stored on Joe’s desktop remain encrypted when moved to external media or
other network based storage?
Câu hỏi 9Select one: a. File level encryption
Encryption is used to ensure the confidentiality of information. In this case you should
make use of file level encryption. File level encryption is a form of disk encryption where
individual files or directories are encrypted by the file system itself. This is in contrast to
full disk encryption where the entire partition or disk, in which the file system resides, is encrypted. b.
Database record level encryption c. Removable disk encryption d. Whole disk encryption Phản hồi Your answer is correct.
The correct answer is: File level encryption Câu hỏi10 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following explains the difference between a public key and a private key? Câu hỏi 10Select one: a.
The public key is only used by the client while the private key is available to all.
Both keys are mathematically related. b.
The private key is commonly used in symmetric key decryption while the public key is
used in asymmetric key decryption. c.
The private key only decrypts the data while the public key only encrypts the data.
Both keys are mathematically related. d.
The private key is only used by the client and kept secret while the public key is available to all.
The private key must be kept secret at all time. The private key is only by the client.
The public key is available to anybody. Phản hồi Your answer is correct.
The correct answer is: The private key is only used by the client and kept secret while
the public key is available to all.