Vulnerability Assessment

Vulnerability Assessment

15 Qs

quiz-placeholder

Similar activities

tmk pangkalan data

tmk pangkalan data

5th Grade

10 Qs

Ulangan Harian - Jaringan Komputer & Analisis Data

Ulangan Harian - Jaringan Komputer & Analisis Data

10th Grade

20 Qs

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

G2_MS Word Basic Parts

G2_MS Word Basic Parts

2nd Grade

10 Qs

DT G5 Revision_2

DT G5 Revision_2

5th Grade

20 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Cloud computing

Cloud computing

Professional Development

10 Qs

แบบทดสอบหลังเรียนเรื่องการจัดการข้อความ

แบบทดสอบหลังเรียนเรื่องการจัดการข้อความ

7th Grade

10 Qs

Vulnerability Assessment

Vulnerability Assessment

Assessment

Quiz

Computers

Practice Problem

Hard

Created by

Avinash Borse

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary need of information security related to confidentiality?

Data secrecy

Data availability

Data authenticity

Data integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of information that needs to be protected for confidentiality?

Email address

Employee ID number

Public holiday calendar

Office address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves interception of network packets to gain unauthorized access to information flowing on the network?

Data diddling attacks

Salami attacks

Packet sniffing

Trust relationship attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Integrity principle in information security refer to?

Data availability

Data authenticity

Data quality

Data confidentiality

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves making a target system unresponsive by sending a large number of synchronous requests?

Electrical power attacks

DDOS attacks

Syn flood attacks

Server room environment attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the interaction with a system before authentication?

Access control

Accountability

Identification

Authorization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which factor used for authentication is the most important but also the easiest to compromise?

Something you know

Something you are

Somewhere you are

Something you have

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?