CyberSaavy

CyberSaavy

University

5 Qs

quiz-placeholder

Similar activities

Analisis Arsitektur 3

Analisis Arsitektur 3

University

10 Qs

Antropologia exposicion

Antropologia exposicion

University

10 Qs

Validaciòn de fuentes de informaciòn

Validaciòn de fuentes de informaciòn

University

10 Qs

Consumers & Innovation

Consumers & Innovation

University

10 Qs

S6 Adobe Premiere CC -4

S6 Adobe Premiere CC -4

University

10 Qs

Digital Marketing - Assignment 02

Digital Marketing - Assignment 02

University

10 Qs

Fotointerpretación y Fotogrametría

Fotointerpretación y Fotogrametría

University

10 Qs

Mobile Computing quiz2

Mobile Computing quiz2

University

10 Qs

CyberSaavy

CyberSaavy

Assessment

Quiz

Other

University

Medium

Created by

psnacsewicysstudentchapter cse

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What are the three fundamental aspects that cybersecurity aims to ensure for information, often referred to as the CIA Triad?

Centralization, Isolation, Authorization

Confidentiality, Isolation, Authentication

   

  

Confidentiality, Integrity, Availability

 Cyberattacks, Intrusion Detection, Anonymity

2.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

How does encryption contribute to cybersecurity, and what does it specifically protect within the realm of information security?

Encryption safeguards physical access to computer systems.

Encryption protects data during transmission or storage, ensuring its confidentiality.

Encryption prevents cyberattacks by creating virtual barriers.

Encryption secures network protocols from unauthorized access.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does TCP stand for in the context of networking protocols, and what is its primary function?

Technical Control Protocol, managing network configurations

Textual Communication Protocol, facilitating text-based communication

Transferable Content Protocol, handling multimedia content transfer

Transmission Control Protocol, ensuring reliable data delivery

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following protocols is commonly used for the transfer of files between a client and a server over a network?

TCP/IP

UDP/IP

FTP

HTTP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of cyber forensics, what does the term "digital evidence" refer to, and why is it important in investigations?

Digital evidence refers to physical artifacts collected from crime scenes. It is crucial for recreating events.

Digital evidence includes any information stored electronically that can be used as proof in legal proceedings. It is vital for building a case.

 Digital evidence pertains only to text-based documents found on computers. It is essential for decoding encrypted messages.

Digital evidence is a term for forensic tools used in cyber investigations. It is essential for analyzing network traffic.