Information Security Finals

Information Security Finals

University

20 Qs

quiz-placeholder

Similar activities

INTERENET CONNECTIONS

INTERENET CONNECTIONS

University

20 Qs

Data Link Layer 3C

Data Link Layer 3C

University

17 Qs

Warriors of the Net GCSE

Warriors of the Net GCSE

9th Grade - University

19 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Week 6 : Quiz 4 & Activity 4

Week 6 : Quiz 4 & Activity 4

University

15 Qs

SSK30343 CNS

SSK30343 CNS

University

15 Qs

Lab Activity 7

Lab Activity 7

University

15 Qs

P1. Prelim Project Quiz

P1. Prelim Project Quiz

University

20 Qs

Information Security Finals

Information Security Finals

Assessment

Quiz

Computers

University

Easy

Created by

Genreve Fernandez

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Someone cannot deny having completed an action because there will be proof that they did it. 

Authentication

Confidentiality

Non – repudiation

Availability

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Individuals gaining unauthorized access to computer systems.

Possession

Hackers

Sabotage

Brute Force Attack

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Allows for a secure network connection over public networks. It encrypts internet traffic and hides your online identity.

Remote Access

Logical Access Control 

Physical Access Control

Virtual Private Networks (Vpns)

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Flooding a system with traffic to make it inaccessible to legitimate users.

Denial-of-Service (DoS) attacks 

Spoofing

Brute Force Attack

Sabotage

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information.

Information Operation 

Server

Networks

Information Assurance 

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Is a combination of hardware, software, data, and users that work together to perform various computing tasks.

Network

Desktop

Workspace

Computer System 

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Occurs when network messages can be intercepted, modified, or misrouted.

Communication Vulnerability 

Exposure

Vulnerabilities

Spoofing 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?