Revision 2

Revision 2

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Data Security Quiz

Data Security Quiz

8th Grade - University

30 Qs

10 Brahamadik 1st term

10 Brahamadik 1st term

10th Grade

30 Qs

Phishing and Social Engineering Awareness

Phishing and Social Engineering Awareness

7th Grade - University

28 Qs

Intro to IT Ch 7 Quiz Review

Intro to IT Ch 7 Quiz Review

9th - 12th Grade

25 Qs

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

27 Qs

Data and Information Security Quiz

Data and Information Security Quiz

9th Grade

30 Qs

Unit 1 Exam: Computational Thinking

Unit 1 Exam: Computational Thinking

12th Grade

25 Qs

Data Visualisation:EC12-06

Data Visualisation:EC12-06

12th Grade

25 Qs

Revision 2

Revision 2

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

aziana aziz

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the CORRECT term related to the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

  Information Confidentiality

Information Integrity

  Information Availability

   Information Security

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Refer to figure below, identify type of security attack in information system.

"Your help desk had informed you that they received an urgent call from the Vice President last night requesting his log on ID and Password. When talking to the VP today, he says that he never made that call"

 

Spoofing

Reply Attack 

Malicious Software

Social Engineering

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the purpose of the Denial-of-Service (DOS) Attack in the information system threat.

Exploit the weakness in the TCP/IP stack

To execute a Trojan on a system.

  Flooding a system so it cannot operate.

To shutdown services by turning them off

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Select the CORRECT security threat that falls into natural disaster class in information security.

Someone tries to steal critical information from company A

A hacker tries to hack into company X database

Heavy storm tore off the roof of IT Department causing flooding in the server room.

Student modifies the password in the lab PC

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the CORRECT type of security threats based on statement below.

   "A worker inside NASA purposely plugs in a USB pen drive into the main server to collect important data every night"

International Threats

Internal Threats

External Threats

Extra Threats

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the CORRECT terminology in cryptographic.

Encryption – The format of the data before being encrypted

Cipher Text – The “scrambled” format of data after being encrypted.

Cryptanalysis – The decryption and analysis of coded, ciphers or encrypted text.

Plain Text – Method by which information is converted into secret code that hide the information true meaning.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the CORRECT folder for file and folder sharing permission based on figure below.

- The folder is shared only with members of the homegroup.

- Homegroup members can only read the contents of the folders.

  

Nobody

Read

Read & Write

Specific People

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?