Back to Course
Data Protection in the IT Department
0% Complete
0/0 Steps
-
Introduction IT Security1 Topic
-
Protection Goals4 Topics|1 Quiz
-
Encryption and Signature3 Topics|1 Quiz
-
Deletion of Data1 Topic|1 Quiz
-
IT-Forensics1 Topic|1 Quiz
-
Safety in the Network4 Topics|1 Quiz
-
Attack Scenarios2 Topics|1 Quiz
-
IT Security in the Overall Concept3 Topics|1 Quiz
-
Cloud Computing1 Topic|1 Quiz
-
IT Security Act and IT Communication2 Topics|1 Quiz
Time limit: 0
Quiz Summary
0 of 3 Fragen completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 3 Fragen answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Please repeat the quiz.
-
Congratulations! You have passed this quiz.
- 1
- 2
- 3
- Current
- Review
- Answered
- Correct
- Incorrect
-
Frage 1 of 3
1. Question
Please complete the following sentence:
-
Asymmetric encryption, symmetric encryption and the are based on a cryptographic procedure.
CorrectIncorrect -
-
Frage 2 of 3
2. Question
Assign the advantages to the respective encryption methods.
Sort elements
- symmetric encryption
- asymmetric encryption
- hybrid encryption
-
speed
-
simple key management
-
simple key management and speed
CorrectIncorrect -
Frage 3 of 3
3. Question
When are digital signatures used?
CorrectIncorrect