Information and Network Security

Information and Network Security

University

15 Qs

quiz-placeholder

Similar activities

Introduction to Research Methodology - Part 1

Introduction to Research Methodology - Part 1

University

20 Qs

2025 ANA 2 EKG 2

2025 ANA 2 EKG 2

12th Grade - University

17 Qs

No 52 GDPR and data loss

No 52 GDPR and data loss

12th Grade - University

15 Qs

Kuis kriptografi

Kuis kriptografi

University

15 Qs

Heart Disease & Stroke

Heart Disease & Stroke

University

10 Qs

FAA Part 107 Loading and Performance 2

FAA Part 107 Loading and Performance 2

10th Grade - University

13 Qs

Anxiety Term quiz

Anxiety Term quiz

University

10 Qs

Program Security

Program Security

University

20 Qs

Information and Network Security

Information and Network Security

Assessment

Quiz

Science

University

Hard

Created by

Pratibha Jadhav

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is information Security ?

About securing information from unauthorized access.

vulnerability protection that comes in the form of a physical device rather than software

refers to the range of tools, controls, and measures designed to establish and preserve database confidentiality

refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOS stand for _____

denial of service

daniel of service

do on schedule

dont open the slot

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is mean by one party cannot deny receiving a message or a transaction nor can the other party deny sending a message or a transaction?
Non-repudiation
Confidentiality
Integrity
Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the formula for Decryption in Caesar Cipher?
p=(c-k) mod 26
c=p+k
c=(p+k) mod 26
p=c-k

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a(n) …...........cipher, the same key is used by both sender and receiver.
A Symmetric-Key
An Asymmetric-key
Both symmetric and asymmetric
none of the mentioned

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

…........... means information is not disclosed to unauthorized individuals, entities and process. 
Confidentiality
Non -Repudiation
Availabilty
Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Attack which involves modification of Data is known as _____.
active attack
passive attack
security attack
threat attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?