INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

1st - 10th Grade

10 Qs

quiz-placeholder

Similar activities

L3 - Cyber Security

L3 - Cyber Security

8th Grade

14 Qs

Cybersecurity Review

Cybersecurity Review

9th - 12th Grade

14 Qs

BTEC DIT - Security

BTEC DIT - Security

9th Grade

10 Qs

Threat prevention

Threat prevention

10th Grade

8 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

INTERNET SECURITY GRADE 8

INTERNET SECURITY GRADE 8

8th Grade

10 Qs

BTEC DIT - Security

BTEC DIT - Security

9th Grade

10 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

Assessment

Quiz

Computers

1st - 10th Grade

Hard

Created by

NOR HANINA

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WHAT IS COMPUTER SECURITY

measures to protect data during transmission across the network.

generic name for the collection of tools designed to protect data and to prevent hackers.

measures to protect data during their transmission over a collection of interconnected networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three aspects of information security EXCEPT:

security attack

SECURITY MECHANISM

SECURITY SERVICES

NETWORK SECURITY

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK:

ANY ACTION THAT COMPROMISES THE SECURITY OF INFORMATION THAT OWNED BY ORGANIZATION

A MECHANISM THAT IS DESIGNED TO DETECT,TO PREVENT OR RECOVER FROM SECURITY ATTACK

A SERVICES THAT ENHANCES THE SECURITY OF DATA PROCESSING SYSTEM AND INFORMATION TRANSFER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY SERVICES EXCEPT

CONFIDENTIALITY

AUTHENTICATION

NON REPUDIATION

INTERCEPTION

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK

AUTHENTICATION

MODIFICATION

FABRICATION

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Modification of data stream

PAASIVE ATTACK

ACTIVE ATTACK

MODIFY ATTACK

SECURITY ATTACK

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

programs can be installed on computer systems to observe traffic, storing information (ID/Passwords) that can be used to access other systems.

DENIAL OF SERVICES

HACKING

SNIFFING

PORT SCANNING

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?