Chapter 16

Chapter 16

University

15 Qs

quiz-placeholder

Similar activities

QUIZ 3- BAEN/ITED

QUIZ 3- BAEN/ITED

University

10 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

Quiz  Cybersecurity Audit

Quiz Cybersecurity Audit

University

15 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Network Defence

Network Defence

University

20 Qs

Cyber Awareness

Cyber Awareness

1st Grade - University

20 Qs

Introduction to Network Security - Episode 1

Introduction to Network Security - Episode 1

University

10 Qs

CNSE

CNSE

University

10 Qs

Chapter 16

Chapter 16

Assessment

Quiz

Computers

University

Medium

Created by

Nguyễn Q Long

Used 14+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describe being secure, information needs to be hidden from unauthorized access?

Confidentiality

Integrity

Availability

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes protecting data information needs to be protected from unauthorized change?

Confidentiality

Availability

Integrity

Deniel of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is threatening integrity?

Snooping

Traffic Analysis

Denial of service

Modification

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is threatening confidentiality?

Snooping

Repudiation

Denial of service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ can be threatened by security attacks.

confidentiality, cryptography, and non-repudiation

confidentiality, encryption, and decryption

confidentiality, denial of service, and masquerading

confidentiality, integrity, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In attacks threatening integrity, ______  happens when the attacker impersonates somebody else

Snooping

Modification

Masquerading

Denial of service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________ means concealing the contents of a message by enciphering.

Steganography

Cryptography

Compressing

Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?