S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

quiz-placeholder

Similar activities

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

Network Security

Network Security

University

20 Qs

IT Essentials Ch 6 Review - Applied Networking

IT Essentials Ch 6 Review - Applied Networking

9th Grade - University

20 Qs

OSI Model - Transport Layer

OSI Model - Transport Layer

9th Grade - Professional Development

10 Qs

Firewall Basic

Firewall Basic

University

10 Qs

Administrasi Dan Pengelolaan Jaringan Komputer

Administrasi Dan Pengelolaan Jaringan Komputer

University

20 Qs

CN UNIT 4

CN UNIT 4

University

18 Qs

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

Assessment

Quiz

Computers

University

Hard

Created by

Drajad Wiryawan

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the left picture, what is the type of control

Deterrent Control

Detective Control

Preventive Control

Correction Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the left picture, what is the control name ?

Detective Control

Preventive Control

Correction Control

Deterrent Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the long name of RAID

Redundancy Arrays of Inexpensive Diskette

Redundancy Arrays of Inexpensive Disks

Redundant Arrays of Inexpensive Diskette

Redundant Arrays of Inexpensive Disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concern of protecting data in physical security

Securing Access

Safety

Accessibility

All Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the Left Picture, what is the type fo social engineering attack

Follower

Pretexting

Following

Tailgating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the picture, what is the type of social engineering attack?

Spying

Phishing

Fishing

Catching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a mechanism for maintaining control over the traffic that flows in and out of networks

Proxy

Router

Firewall

Modem

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?