CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

University

10 Qs

quiz-placeholder

Similar activities

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

Cisco 1, Module 16

Cisco 1, Module 16

University

15 Qs

CHAPTER 2: Developing Your Security Policy

CHAPTER 2: Developing Your Security Policy

University

11 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

THM Indore

THM Indore

University

12 Qs

Study

Study

University

12 Qs

SSK30343 CNS

SSK30343 CNS

University

15 Qs

IAS_1-Quiz No.3 (final term)

IAS_1-Quiz No.3 (final term)

University

15 Qs

CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

Assessment

Quiz

Computers

University

Hard

Created by

farizatul akmar

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which of the following are the THREE (3) importance of computer and network security?

To protect company assets

To keep your accessibility

To gain a competitive advantage

To keep you job

2.

FILL IN THE BLANK QUESTION

1 min • 3 pts

The three legs of the "security trinity" are:

1. ________

2. ________

3. ________

3.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the FOUR (4) core principles of Information Security?

Integrity

Prevention

Confidentiality

Availability

Authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The following are the risks assessment process of evaluating potential risks EXCEPT ...

Identifying and prioritizing assets

Identifying threats and their probabilities

Developing a cost benefit analysis

Identifying accessibility

Identifying countermeasure

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

____________ is an effort to obtain illegal admission to your organization’s network, to take your data without your knowledge, or execute other malicious pursuits

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ refers to malicious hackers gain unauthorized access to a computer system or network. They also make amendments to the data, either by encrypting, removing, or compromising it.

7.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the FOUR (4) major categories of Network Security Threats?

Structured Threats

Cumulative Threats

Externals Threats

Internal Threats

Unstructured Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?