
Cyber forensic and security
Authored by Hitesh Grewal
Computers
University
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
Confidentiality
Integrity
Availability
Authenticity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of encoding information in a way so that only someone with a key can decode it?
Compression
Systemic variation
Encryption
Data Encapsulation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
Confidentiality
Integrity
Availability
Authenticity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Imagine if customers of a bank are unable to access its account resources than which objective of security will be compromised here.
Authenticity
Availability.
Integrity.
Confidentiality.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
Worm
Virus
Zombie
Trojan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is independent malicious program that need not any host program?
Trap doors
Trojan horse
Virus
Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following malicious program do not replicate automatically?
Trojan Horse
Virus
Worm
Zombie
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?