Security Lecture 08
Security Lecture 08
By Indika W Bandara
Data Protection
What is Data Protection ?
● Identification
● Authentication
● Access control
● Lock
An algorithm in encryption is called ________
● Algorithm
● Procedure
● Cipher
● Module
The information that get transformed in
encryption is _____________
● Plain text
● Parallel text
● Encrypted text
● Decrypted text
The process of verifying the identity of a
user is _____________
● Authentication
● Identification
● Validation
● Verification
Which of the following is a type of
cybersecurity ?
● Cloud Security
● Network Security
● Application Security
● All of the above
Which are the features of cybersecurity ?
● Compliance
● Defence against Internal threats
● Threat prevention
● All of the above
Which of these is a part of network
identification ?
● UserID
● Password
● OTP
● Fingerprint
Which of the following are valid authentication
methods ?
● WPA3
● WPA2
● WPA
● WEP
___________ ensures the integrity and security
of data that are passing over a network
● Firewall
● Antivirus
● Pentesting tools
● Network-security protocol
___________ is any action that might compromise
cyber-security
● Threat
● Vulnerability
● Exploit
● Attack
Existence of weakness in a system or network
is called _________
● Threat
● Vulnerability
● Exploit
● Attack
HTTPS is abbreviated as ____________