
SLOT 1: Foundation 1
Authored by Izuan Ninggal
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 10 pts
Which of the following are computing assets?
Cloud
WiFi
Network Router
Stapler
USB flash Drive
2.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
"Change existing values in a database unauthorizedly". This threat refers to
Interruption
Interception
Modification
Fabrication
3.
MULTIPLE SELECT QUESTION
45 sec • 10 pts
When we say security protection, we want to achieve these goals:
Confidence
Integrity
Availability
Durability
Confidentiality
4.
FILL IN THE BLANK QUESTION
1 min • 10 pts
"Ensuring that data and services are accessible when needed."
This statement refers to which security goal (CIA Triad)?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The following statements refer to integrity:
Guaranteeing the correctness of data
Maintaining privacy
Preventing unauthorized access
Maintaining system uptime
6.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
The attacker unauthorizedly obtain information without changing the system resource. This attack refers to:
Active attack
Passive attack
Insider attack
Outsider attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
This cryptography uses two keys, one for encryption and another key for decryption.
Symmetric encryption
Metric encryption
Public-key encryption
Private-key Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?