Basic security

Basic security

Professional Development

9 Qs

quiz-placeholder

Similar activities

แบบประเมินสมรรถนะอาสาสมัครดิจิทัล (อสด.) รอบบ่าย

แบบประเมินสมรรถนะอาสาสมัครดิจิทัล (อสด.) รอบบ่าย

Professional Development

10 Qs

How much do you REALLY know Heartland?

How much do you REALLY know Heartland?

5th Grade - Professional Development

13 Qs

Disney Characters *Hard*

Disney Characters *Hard*

KG - Professional Development

12 Qs

PKT Supply_Week-4_May'21

PKT Supply_Week-4_May'21

Professional Development

10 Qs

Ramadan Facts

Ramadan Facts

Professional Development

10 Qs

Welcome to Mumbai

Welcome to Mumbai

Professional Development

9 Qs

Project mc²

Project mc²

2nd Grade - Professional Development

11 Qs

OSH - Module 1

OSH - Module 1

Professional Development

11 Qs

Basic security

Basic security

Assessment

Quiz

Other

Professional Development

Practice Problem

Medium

Created by

Akash Goel

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Non-Repudiation uses which kind of service to provide the receiver with evidence the message was sent by the user?

Proof of delivery
Proof of origin
Proof of identity
Proof of authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component defines the ability to protect data from unauthorized access?

Availability
Integrity
Confidentiality
Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we talk about threats, people seek to cause damage with different motives known as threat actors however which of the following is NOT a motive of a threat actor?

Financial Gain
Trade Secrets
Emotional damage
Espionage
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk assessment is a process to identify impact to business in case of an attack and it is often associated with the formula:

Hazard x Vulnerability x Impact
Threat x Vulnerability x Impact
Threat x Vulnerability x Security
Threat x Impact

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of a business continuity plan?

Excessive security
Employee Training
Secure office furniture
Routine Backups

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a business continuity plan?

Maximising profits
Reducing operational costs
Ensuring employee satisfaction
Maintaining business operations during disruptions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe a deceptive technique where an attacker disguises their identity or manipulates information to appear as a trustworthy source?

Trojan Horse
Firewall
Spoofing
Decryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?