Security Quiz

Security Quiz

35 Qs

quiz-placeholder

Similar activities

Taxes Review

Taxes Review

9th - 12th Grade

35 Qs

Chapter 7 Evaluation

Chapter 7 Evaluation

8th Grade

34 Qs

Class - X : Cyber Security  40 Marks

Class - X : Cyber Security 40 Marks

10th Grade

40 Qs

Intro to Entrepreneurship Final Exam '25

Intro to Entrepreneurship Final Exam '25

9th - 12th Grade

35 Qs

KM Chap 5

KM Chap 5

University

30 Qs

Mid Term Examination 2024 Class V

Mid Term Examination 2024 Class V

KG - University

36 Qs

4.01-4.03/Chapter 3 Test

4.01-4.03/Chapter 3 Test

9th - 12th Grade

30 Qs

Appositive Phrases Practices

Appositive Phrases Practices

KG - University

40 Qs

Security Quiz

Security Quiz

Assessment

Quiz

others

Hard

Created by

Mirul :v

FREE Resource

35 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

manakah type of hacker
Black Hat
Green Hat
Grey Hat
White Hat

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which is security goals
Confidentiality
Scalibility
Accountability
Integrity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the CORRECT meaning of hard drive destruction.
Ways for people to exchange information with each other
The process of giving someone permission to do or have something
A process of destroying data stored on in hard disks so that it is completely unreadable and cannot be accessed or used.
A process of transmitting files over a computer network or the Internet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

mana jawapannya
A
B
C
D

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT security threat that falls into natural disaster class in information security.
Someone tries to steal critical information from company A
A hacker tries to hack into company X database
Heavy storm tore off the roof of IT Department causing flooding in the server room
Student modifies the password in the lab PC

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the CORRECT terminology in cryptographic.
Encryption - The format of the data before being encrypted.
Cipher text - The "scrambled" format of data after being encrypted.
Cryptanalysis - The decryption and analysis of codes, ciphers or encrypted text
Plain text - Method by which information is converted into secret code that

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe Service Level Agreement (SLA) in IT professional and ethics.
A written document on manual handling.
A contract between a manufacturer and a service provider.
A contract between service provider and a customer on the scope of service provided.
A verbal document between a service provider and a customer on sales and purchase of the devices.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?