TracnghiemTACN

TracnghiemTACN

University

52 Qs

quiz-placeholder

Similar activities

MID TERM TEST OF ENGLISH FOR ECONOMICS

MID TERM TEST OF ENGLISH FOR ECONOMICS

University

50 Qs

Fun English

Fun English

University

51 Qs

ASAS Gasal B.ING Kelas XI

ASAS Gasal B.ING Kelas XI

12th Grade - University

50 Qs

Ағылшын А2 (201-250)

Ағылшын А2 (201-250)

University

50 Qs

PRETEST - ENGLISH BASIC

PRETEST - ENGLISH BASIC

7th Grade - University

50 Qs

Assessment 1 - English 2 - Class 45-02 & 45-03

Assessment 1 - English 2 - Class 45-02 & 45-03

University

50 Qs

The Future Sentenses Using  Will  and Question Words

The Future Sentenses Using Will and Question Words

6th Grade - University

52 Qs

TracnghiemTACN

TracnghiemTACN

Assessment

Quiz

English

University

Medium

Created by

Phạm Vũ

Used 8+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary threats to security were …………….

sabotage

physical theft of equipment

espionage against the products of the systems

All are correct

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

................ primary function, text processing, did not require the same

level of security as that of its predecessor.

ARPANET’s

ARPA’s

MULTICS’

UNIX’s

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Early computing approaches relied on ..........................

information security theory and cryptography.

security that was built into the physical environment of the data center that housed the computers.

the growing threat of cyber-attacks.

the level of security of every computer.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Network security was referred to as network insecurity............... the range

and frequency of computer security violations and the explosion in the

numbers of hosts and users on ARPANET.

Because of

However

Therefore

Although

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………. is a category of objects, persons, or other entities that presents a danger to an asset.

Threat

Security posture

Risk

Vulnerability

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………………… , is a multilayered system that protects the sovereignty of a state, its assets, its resources, and its people.

Personnel security

National security

Network security

Physical security

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Someone casually reading sensitive information not intended for his or her use is……….

intentional attack

a passive attack

direct attack

active attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?