S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

quiz-placeholder

Similar activities

BARRA DE TAREA Y PANEL DE CONTROL

BARRA DE TAREA Y PANEL DE CONTROL

University

10 Qs

Basic on Operating System

Basic on Operating System

University

10 Qs

POP QUIZ 4 (DFC40243)

POP QUIZ 4 (DFC40243)

University

10 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Komdat Chap 2

Komdat Chap 2

University

10 Qs

ARKOM 2_INS

ARKOM 2_INS

University

15 Qs

CompTIA Core 2  20221023

CompTIA Core 2 20221023

University

10 Qs

Guess The Logo

Guess The Logo

5th Grade - Professional Development

15 Qs

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

Assessment

Quiz

Computers

University

Hard

Created by

Drajad Wiryawan

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the left picture, what is the type of control

Deterrent Control

Detective Control

Preventive Control

Correction Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the left picture, what is the control name ?

Detective Control

Preventive Control

Correction Control

Deterrent Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the long name of RAID

Redundancy Arrays of Inexpensive Diskette

Redundancy Arrays of Inexpensive Disks

Redundant Arrays of Inexpensive Diskette

Redundant Arrays of Inexpensive Disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concern of protecting data in physical security

Securing Access

Safety

Accessibility

All Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the Left Picture, what is the type fo social engineering attack

Follower

Pretexting

Following

Tailgating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the picture, what is the type of social engineering attack?

Spying

Phishing

Fishing

Catching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a mechanism for maintaining control over the traffic that flows in and out of networks

Proxy

Router

Firewall

Modem

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?