
SIC quiz 2
Authored by SHILPA NIMBRE
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The attack surface of the operating system is
reduced by _____________
Installing unnecessary
software
Disabling unneeded
services
Allowing access to
everyone
Giving administrative
privileges to everyone.
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is Authentication ?
Encryption
Proof of Identity
Access
Access
Modification
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which among the following is a method that could be implemented to minimize the
risk of a successful attack?
Creating a computer security defense plan
By sharing passwords with unknown people
By allowing mobile codes to be run without malware scanning
By not using firewall
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
SSL stands for?
Secured Socket Layer
Secured Shell Layer
System Socket Layer
System Secured Layer
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
_______attempt to guess a password by trying all the character combinations
listed in an accompanying dictionary
Brute-force tools
File-system transversal
SQL injection attack
Permutation
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In computer security, ……………………. means that computer system assets can be
modified only by authorized parities
Confidentiality
Integrity
Availability
Authenticity
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
__________ is the act of capturing packets of data flowing across a computer network
packet catching
packet snipping
packet sniffing
packet pulling
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?