Home
Flashcards
Preview
GCC Class 2 Lesson 12 Quiz
Home
Get App
Take Quiz
Create
What is 3DES based on?
A. One Time Pad.
B. Hashing algorithm.
C. Asymmetric key-based algorithm.
D. Symmetric key-based algorithm.
D. Symmetric key-based algorithm.
What is used for verifying whether or not a digital certificate is valid?
A. IPSec.
B. EDC.
C. CRL.
D. PGP.
C. CRL
Which of the following is an example of a DoS attack?
A. Your Web server has gone into a loop trying to service a client request.
B. Your keyboard is no longer responding.
C. Your router is unable to find a destination outside of your network.
D. A computer on your network crashed.
A. Your Web server has gone into a loop trying to service a client request.
Which of the following is the most secure method to determine unique identification of an employee?
A. Username/Password.
B. Smart card.
C. Biometric.
D. Credit card.
C. Biometric.
Which of the following describes a differential backup?
A. It backs up only the information that was added since the last previous differential backup.
B. It backs up only the information modified or added since the last full backup.
C. It backs up only the information modified or added since the last incremental backup.
D. It backs up all the information on the disk to an offline device.
B. It backs up only the information modified or added since the last full backup.
Author
williamsanders
ID
353286
Card Set
GCC Class 2 Lesson 12 Quiz
Description
GCC Class 2 Lesson 12 Quiz
Updated
2020-09-25T03:08:37Z
Home
Flashcards
Preview