Chapter 1 Security Basics IT Professional

Chapter 1 Security Basics IT Professional

University

14 Qs

quiz-placeholder

Similar activities

Cyber Security quiz

Cyber Security quiz

University

15 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

Komputer dan Masyarakat

Komputer dan Masyarakat

University

10 Qs

The Internet

The Internet

6th Grade - Professional Development

14 Qs

SSK30343 CNS

SSK30343 CNS

University

15 Qs

Program UMS SPRINT

Program UMS SPRINT

University

17 Qs

GUESS THE ANSWER

GUESS THE ANSWER

University

10 Qs

25-1 M2 Malware

25-1 M2 Malware

University

15 Qs

Chapter 1 Security Basics IT Professional

Chapter 1 Security Basics IT Professional

Assessment

Quiz

Computers

University

Medium

Created by

Syamsul Maa'rif Mohamad

Used 5+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

10 sec • 3 pts

What is CIA stand for ?

Security

Confidentiality

Integrity

Availability

2.

MULTIPLE SELECT QUESTION

10 sec • 3 pts

Types of hacker :

White-hat hacker

Green-hat hacker

Grey-hat hacker

Black-hat hacker

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization's information systems.

Black-hat hacker

Green-hat hacker

Grey-hat hacker

White-hat hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. It does not have any permission or authority to compromise their targets.

Black-hat hacker

White-hat hacker

Grey-hat hacker

Red-hat hacker

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A person or other entity such as computer program that attempts to cause harm (destroy, expose, alter, disable, steal or gain unauthorized access) to an information system.

HACKER

ATTACKER

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Any skilled computer expert that uses their technical knowledge to break into computer systems.

Hacking

Hacker

Attacker

Attacking

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attempt to exploit a computer system or private network inside a computer. It is unauthorised access to or control over computer network security systems for some illicit purpose.

Hacking

Hacker

Attacker

Attacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?