
Revision 2
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
aziana aziz
Used 3+ times
FREE Resource
Enhance your content in a minute
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the CORRECT term related to the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Information Confidentiality
Information Integrity
Information Availability
Information Security
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Refer to figure below, identify type of security attack in information system.
"Your help desk had informed you that they received an urgent call from the Vice President last night requesting his log on ID and Password. When talking to the VP today, he says that he never made that call"
Spoofing
Reply Attack
Malicious Software
Social Engineering
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the purpose of the Denial-of-Service (DOS) Attack in the information system threat.
Exploit the weakness in the TCP/IP stack
To execute a Trojan on a system.
Flooding a system so it cannot operate.
To shutdown services by turning them off
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Select the CORRECT security threat that falls into natural disaster class in information security.
Someone tries to steal critical information from company A
A hacker tries to hack into company X database
Heavy storm tore off the roof of IT Department causing flooding in the server room.
Student modifies the password in the lab PC
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Choose the CORRECT type of security threats based on statement below.
"A worker inside NASA purposely plugs in a USB pen drive into the main server to collect important data every night"
International Threats
Internal Threats
External Threats
Extra Threats
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the CORRECT terminology in cryptographic.
Encryption – The format of the data before being encrypted
Cipher Text – The “scrambled” format of data after being encrypted.
Cryptanalysis – The decryption and analysis of coded, ciphers or encrypted text.
Plain Text – Method by which information is converted into secret code that hide the information true meaning.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Choose the CORRECT folder for file and folder sharing permission based on figure below.
- The folder is shared only with members of the homegroup.
- Homegroup members can only read the contents of the folders.
Nobody
Read
Read & Write
Specific People
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Winter is always the Wintertime
Quiz
•
11th Grade
26 questions
Data Risks
Quiz
•
10th - 12th Grade
27 questions
Computer Quiz الصف الثاني الثانوي التحرير الرسميه لغات
Quiz
•
11th Grade
25 questions
HTML
Quiz
•
11th Grade
25 questions
Skawa- grafika
Quiz
•
5th - 10th Grade
25 questions
web development
Quiz
•
10th Grade
25 questions
Green St Patrick's Day
Quiz
•
12th Grade
25 questions
World of AI
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
