Quiz-summary
0 of 1 questions completed
Questions:
- 1
Information
Weekly Quiz 15
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 1 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- Answered
- Review
-
Question 1 of 1
1. Question
Drag the correct word or phrase to the right-hand column next to its definition.
Sort elements
- Authentication
- Authorization
- Backing up
- Blacklist
- Cryptography
- Cybersecurity
- Cyberespionage
-
The process of proving an individual is a claimed identity
-
The security mechanism determining and enforcing what authenticated users are authorized to do within a computer system
-
Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution
-
A security mechanism that allows through elements (usernames, passwords) unless specifically listed (often types of software such as malware)
-
The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
-
The efforts to design, implement, and maintain security for an organization's network, which is connected to the Internet
-
The unethical act of violating the privacy and security of an organization in order to leak data or disclose internal, private, or confidential information
Correct
Incorrect