SIC quiz 2

SIC quiz 2

University

18 Qs

quiz-placeholder

Similar activities

Security+ SY0-701

Security+ SY0-701

University

15 Qs

Fellowship program 2021

Fellowship program 2021

University - Professional Development

15 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

Week 6 : Quiz 4 & Activity 4

Week 6 : Quiz 4 & Activity 4

University

15 Qs

Digital Forensics Quiz

Digital Forensics Quiz

University

20 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

Testout Security Pro

Testout Security Pro

University

19 Qs

Computing

Computing

KG - Professional Development

17 Qs

SIC quiz 2

SIC quiz 2

Assessment

Quiz

Computers

University

Hard

Created by

SHILPA NIMBRE

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The attack surface of the operating system is

reduced by _____________

Installing unnecessary

software

Disabling unneeded

services

Allowing access to

everyone

Giving administrative

privileges to everyone.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Authentication ?

Encryption

Proof of Identity

Access

Access

Modification

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which among the following is a method that could be implemented to minimize the

risk of a successful attack?

Creating a computer security defense plan

By sharing passwords with unknown people

By allowing mobile codes to be run without malware scanning

By not using firewall

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

SSL stands for?

Secured Socket Layer

Secured Shell Layer

System Socket Layer

System Secured Layer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______attempt to guess a password by trying all the character combinations

listed in an accompanying dictionary

Brute-force tools

File-system transversal

SQL injection attack

Permutation

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In computer security, ……………………. means that computer system assets can be

modified only by authorized parities

Confidentiality

Integrity

Availability

Authenticity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

__________ is the act of capturing packets of data flowing across a computer network

packet catching

packet snipping

packet sniffing

packet pulling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?