Personal Data
Encryption
Operating Systems
System Administion
Random
100

Which of the following data is not considered personal data?

Pet's Name

100

A vulnerability of the Diffie-Hellman's Key Exchange is a lack of?

authentication 

100

Which file system would be the best choice to use in a drive that will be used with both Windows 10 and macOS?

FAT32

100

Which of the following settings could be changed in order to increase your browsing speed?

Client-side scripting is disabled

100

Which statement is true about cross-platform software?

Some features might vary

200

What does GDPR stand for?

General Data Protection Regulation

200

What is the term used in cryptography when the same key is used to encrypt and decrypt the data?

Symmetric Encryption

200

Which of the following file types would enable an audio file to work on both Windows and macOS?

MP3
200

Which of the following can be used to filter which sites are allowed through to the browser?

proxy settings

200

Which of the following are saved even when in private browsing?

Bookmarks

300

Which of the following describes the purpose of the GDPR and the CCPA?

To protect individuals' personal data rights

300

Which of the following statements about passphrases is true?

Passphrases are longer than passwords, making them more secure

300

Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive?

journaling

300

Which of the following security features is put into place to ensure correct authorization?

Account permissions

300
A locally installed application is an example of which application architecture?

One tier

400

In the context of evaluation electronic information resources, what does "bias" refer to?

A skewed or one-sided perspective in the information

400

Why is multifactor authentication more secure than single-factor authentication? 

It requires multiple forms of identify verification

400

You'd like to add features to a calendar app with the permission of the vendor without paying any licensing fees. What type of license is required to be able to do this?

Open source

400

You type in pwd and find your current folder path is ~/Users/student/Documents/Cybersecurity/Images. What command will place you inside the Cybersecurity folder?

cd ..

400

An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert?

Antivirus Software

500

What is the primary goal of information literacy?

To evaluate, use, and ethically manage information

500

Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. What is the Ciphertext?

OLSSV

500

In a three-tier application architecture example, which device runs the presentation layer?

Client computer

500

Which command will allow you to see all running programs and applications on your computer?

ps

500

Which of the following is the most secure password?
@ppl3!2

apple-spoon-horse-painting

apple123

@ppL3P!e

apple-spoon-horse-painting