SIC-Quiz 3 (2023-24)

SIC-Quiz 3 (2023-24)

University

24 Qs

quiz-placeholder

Similar activities

Tuutorite test 2025

Tuutorite test 2025

University

24 Qs

Testout Security 4.1-4.2

Testout Security 4.1-4.2

11th Grade - University

20 Qs

แบบทดสอบ IoT

แบบทดสอบ IoT

University

25 Qs

Basic Information Security

Basic Information Security

University

24 Qs

Challenging Cloud Security Concepts

Challenging Cloud Security Concepts

University

26 Qs

Travel and Tourism Quiz

Travel and Tourism Quiz

5th Grade - University

20 Qs

Avsec

Avsec

1st Grade - University

20 Qs

Quiz 1 in Cardiovascular Assessment-Part 1

Quiz 1 in Cardiovascular Assessment-Part 1

University

20 Qs

SIC-Quiz 3 (2023-24)

SIC-Quiz 3 (2023-24)

Assessment

Quiz

Other

University

Medium

Created by

SHILPA NIMBRE

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for

Central Intelligence Agency

Confidentiality, Integrity, Availability

Cyber security ,Investigation Agency

Cyber security, Internet, Accessibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ means protecting the data from getting disclosed to those who are not

authorized to use it.

Integrity

Authorization

Confidentiality

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________ means that the sender must not be able to deny sending a message

that he / she has sent.

Authentication

Integrity

Confidentiality

Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is wireless attack

Use a fake Access Point and an “evil twin.”

File-system transversal

Buffer overflows

Traffic generators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a physical threat to companies?

Theft

Emergency

Availability

Network Failure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PKI stands for

partial key infrastructure

private key infrastructure

public key infrastructure

parallel key infrastructure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which among the following is a method that could be implemented to minimize the

risk of a successful attack?

Creating a computer security defense plan

By sharing passwords with unknown people

By allowing mobile codes to be run without malware scanning

By not using firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?