quizz

quizz

University

10 Qs

quiz-placeholder

Similar activities

Computer Terms

Computer Terms

University

14 Qs

EC8071_CR_MODELEXAM-III (24.10.2020)_PART-B

EC8071_CR_MODELEXAM-III (24.10.2020)_PART-B

University

15 Qs

Cryptography

Cryptography

University

15 Qs

Blum Decode Quiz

Blum Decode Quiz

University

10 Qs

Chapter 12 Cryptocurrencies

Chapter 12 Cryptocurrencies

University

15 Qs

Mobilities and Information Technology - Revision 1

Mobilities and Information Technology - Revision 1

University

14 Qs

Modul 1

Modul 1

University

5 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

quizz

quizz

Assessment

Quiz

Other

University

Hard

Created by

abdulla jasim

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary purpose of an Intrusion Detection and Prevention System (IDPS)?

To launch attacks against intruders

o hide the presence of intrusions

To identify and report an intrusion

To encourage attackers to continue their activities

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a function of a Honeypot system?

To directly protect critical systems

To divert attackers from accessing critical systems

To launch aggressive attacks against intruders

To encrypt all network traffic

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a key advantage of a Host-based IDPS (HIDPS) over a Network-based IDPS (NIDPS)?

​ HIDPS can monitor network traffic

NIDPS can access encrypted information

HIDPS is not affected by switched network protocols

NIDPS can detect local events on host systems

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following terms refers to the "actions taken to help ensure a desired outcome?

  • Risk

  • Control

  • Threat

  • Vulnerability

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What field of science encompasses both cryptography and cryptanalysis?

  • Cybersecurity

  • Cryptology

  • Informatics

  • Encryption

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to the process of obtaining the plaintext message from a ciphertext message without knowing the keys used for encryption?

  • Cryptography

  • Decryption

  • Cryptanalysis

  • Encoding

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a component of cryptology?

  • Cryptography

  • Cryptanalysis

  • Plaintext

  • Cybersecurity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?