Vulnerability Assessment

Vulnerability Assessment

15 Qs

quiz-placeholder

Similar activities

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Q1 M 2 - TOPIC 2 / Check your understanding

Q1 M 2 - TOPIC 2 / Check your understanding

10th Grade

10 Qs

ICT - Networks and communication

ICT - Networks and communication

9th Grade

11 Qs

Class 1 L-  3 & 4.  CW Practice questions

Class 1 L- 3 & 4. CW Practice questions

1st Grade

20 Qs

Asesmen Sumatif Kelas 7 Semester Genap

Asesmen Sumatif Kelas 7 Semester Genap

7th Grade

17 Qs

ICT and SST Week Quiz_Grade 6

ICT and SST Week Quiz_Grade 6

6th Grade

20 Qs

machineLearning Test

machineLearning Test

Professional Development

20 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Vulnerability Assessment

Vulnerability Assessment

Assessment

Quiz

Computers

Practice Problem

Hard

Created by

Avinash Borse

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary need of information security related to confidentiality?

Data secrecy

Data availability

Data authenticity

Data integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of information that needs to be protected for confidentiality?

Email address

Employee ID number

Public holiday calendar

Office address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves interception of network packets to gain unauthorized access to information flowing on the network?

Data diddling attacks

Salami attacks

Packet sniffing

Trust relationship attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Integrity principle in information security refer to?

Data availability

Data authenticity

Data quality

Data confidentiality

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves making a target system unresponsive by sending a large number of synchronous requests?

Electrical power attacks

DDOS attacks

Syn flood attacks

Server room environment attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the interaction with a system before authentication?

Access control

Accountability

Identification

Authorization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which factor used for authentication is the most important but also the easiest to compromise?

Something you know

Something you are

Somewhere you are

Something you have

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?