CYBER CHALLANGES'24 QUIZ BATCH 1

CYBER CHALLANGES'24 QUIZ BATCH 1

University

20 Qs

quiz-placeholder

Similar activities

Cryptology and Modern Network Security Quiz

Cryptology and Modern Network Security Quiz

University

24 Qs

Unit-1 Introduction to Cloud Computing

Unit-1 Introduction to Cloud Computing

University

20 Qs

Quiz 02-Finals-IT 222-FIAS

Quiz 02-Finals-IT 222-FIAS

University

18 Qs

2.2 Data Transmission

2.2 Data Transmission

University

18 Qs

Mengenal Jenis-Jenis Malware

Mengenal Jenis-Jenis Malware

12th Grade - University

20 Qs

Test

Test

University

15 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

Network Topologies and Key Network Components

Network Topologies and Key Network Components

10th Grade - University

15 Qs

CYBER CHALLANGES'24 QUIZ BATCH 1

CYBER CHALLANGES'24 QUIZ BATCH 1

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Santhoshkumar M

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

PCT Stands for________

Private Communication Technique

Private Connection Technology

Private Communication Technology

Personal Communication Technology

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a Trojan horse in computer security?

Software used for data recovery

A program that seems legitimate but damages the system

Antivirus software

A type of malware that replicates itself

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does data encryption involve?

Encoding data into a secret code

Converting data into a human-readable format

Compressing data to save storage space

Deleting data permanently from storage

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the security of data from tampering by unidentified users ?

Confidentiality

Integrity

Authentication

Non-repudiation

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which one of the following can be considered as the class of computer threats?

Dos Attack

Phishing

Soliciting

Both A and C

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A coffee shop that collects payments from customers by debit / credit cards would be liable under the data privacy.

True

False

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the primary purpose of a firewall?

To monitor and control incoming and outgoing network traffic

To encrypt data

To store backups

to manage the passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?