UTS Keamanan Sistem A

UTS Keamanan Sistem A

University

30 Qs

quiz-placeholder

Similar activities

Segurança da informação

Segurança da informação

University

32 Qs

Information Security Quiz

Information Security Quiz

University

25 Qs

Chapter 1 Intro to Cybersecurity Cisco

Chapter 1 Intro to Cybersecurity Cisco

10th Grade - University

25 Qs

CISSP Ch. 4

CISSP Ch. 4

University

35 Qs

PAW-Q5-2023

PAW-Q5-2023

University

25 Qs

Mock Test

Mock Test

University

27 Qs

IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

Jan22 CSS Revision Part 2 (Ch7 - Ch11)

Jan22 CSS Revision Part 2 (Ch7 - Ch11)

University

30 Qs

UTS Keamanan Sistem A

UTS Keamanan Sistem A

Assessment

Quiz

Computers

University

Medium

Created by

Ikhwan Ruslianto

Used 18+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Assurance that the information is accessible only to those authorized to have access

Confidentiality

Integrity

Availability

Authenticity

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The trustworthiness of data or resources in terms of preventing improper or unauthorized changes

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Motive (Goal) + Method + Vulnerability =

Hacker

System hacking

Defence

Attack

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Motives behind information security attacks, except

Disrupting business continuity

Taking revenge

Demanding ransom

Doing home work

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Classification of Attacks, except

Passive Attacks

Active Attacks

Close-out Attacks

Insider Attacks

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Collects information about a target network to identify various ways to intrude into the system

Covering track

Penetration

Footprinting

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?