TracnghiemTACN

TracnghiemTACN

University

52 Qs

quiz-placeholder

Similar activities

AKT test (351-400)   Ескі вариант

AKT test (351-400) Ескі вариант

University

50 Qs

AKT test (451-500)   Ескі вариант

AKT test (451-500) Ескі вариант

University

55 Qs

Grupa A- 50 pojęć informatycznych

Grupa A- 50 pojęć informatycznych

KG - Professional Development

50 Qs

EXAM TRAINER TEST 3

EXAM TRAINER TEST 3

University

54 Qs

W04 - WMA

W04 - WMA

University

50 Qs

Day 15

Day 15

University

50 Qs

Technology of Multimedia

Technology of Multimedia

11th Grade - University

50 Qs

#A004

#A004

University

50 Qs

TracnghiemTACN

TracnghiemTACN

Assessment

Quiz

English

University

Medium

Created by

Phạm Vũ

Used 8+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary threats to security were …………….

sabotage

physical theft of equipment

espionage against the products of the systems

All are correct

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

................ primary function, text processing, did not require the same

level of security as that of its predecessor.

ARPANET’s

ARPA’s

MULTICS’

UNIX’s

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Early computing approaches relied on ..........................

information security theory and cryptography.

security that was built into the physical environment of the data center that housed the computers.

the growing threat of cyber-attacks.

the level of security of every computer.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Network security was referred to as network insecurity............... the range

and frequency of computer security violations and the explosion in the

numbers of hosts and users on ARPANET.

Because of

However

Therefore

Although

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………. is a category of objects, persons, or other entities that presents a danger to an asset.

Threat

Security posture

Risk

Vulnerability

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………………… , is a multilayered system that protects the sovereignty of a state, its assets, its resources, and its people.

Personnel security

National security

Network security

Physical security

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Someone casually reading sensitive information not intended for his or her use is……….

intentional attack

a passive attack

direct attack

active attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?