Revision 2

Revision 2

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

APP DISTRIBUIDAS

APP DISTRIBUIDAS

12th Grade

26 Qs

Grip, Electric, & Cameras

Grip, Electric, & Cameras

9th - 12th Grade

30 Qs

ICT QUIZ!

ICT QUIZ!

10th - 12th Grade

25 Qs

Types of Media

Types of Media

11th - 12th Grade

25 Qs

Collection of Data

Collection of Data

9th - 12th Grade

25 Qs

Getting to know spreadsheet

Getting to know spreadsheet

9th Grade

25 Qs

Pekan Ulangan Semester - Informatika

Pekan Ulangan Semester - Informatika

10th Grade

25 Qs

Revision 2

Revision 2

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

aziana aziz

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the CORRECT term related to the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

  Information Confidentiality

Information Integrity

  Information Availability

   Information Security

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Refer to figure below, identify type of security attack in information system.

"Your help desk had informed you that they received an urgent call from the Vice President last night requesting his log on ID and Password. When talking to the VP today, he says that he never made that call"

 

Spoofing

Reply Attack 

Malicious Software

Social Engineering

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the purpose of the Denial-of-Service (DOS) Attack in the information system threat.

Exploit the weakness in the TCP/IP stack

To execute a Trojan on a system.

  Flooding a system so it cannot operate.

To shutdown services by turning them off

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Select the CORRECT security threat that falls into natural disaster class in information security.

Someone tries to steal critical information from company A

A hacker tries to hack into company X database

Heavy storm tore off the roof of IT Department causing flooding in the server room.

Student modifies the password in the lab PC

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the CORRECT type of security threats based on statement below.

   "A worker inside NASA purposely plugs in a USB pen drive into the main server to collect important data every night"

International Threats

Internal Threats

External Threats

Extra Threats

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the CORRECT terminology in cryptographic.

Encryption – The format of the data before being encrypted

Cipher Text – The “scrambled” format of data after being encrypted.

Cryptanalysis – The decryption and analysis of coded, ciphers or encrypted text.

Plain Text – Method by which information is converted into secret code that hide the information true meaning.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the CORRECT folder for file and folder sharing permission based on figure below.

- The folder is shared only with members of the homegroup.

- Homegroup members can only read the contents of the folders.

  

Nobody

Read

Read & Write

Specific People

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?