CNAG | Cybersecuity

CNAG | Cybersecuity

University

5 Qs

quiz-placeholder

Similar activities

Dining Philosophers Problem MCQs

Dining Philosophers Problem MCQs

University

10 Qs

International ICT Policies in Education

International ICT Policies in Education

University

10 Qs

Jaringan Komputer dan Internet

Jaringan Komputer dan Internet

9th Grade - University

10 Qs

Quiz Profesi dan Ketrampilan Bidang TKJ

Quiz Profesi dan Ketrampilan Bidang TKJ

10th Grade - University

10 Qs

ЕРАСЫЛ АХМЕТОВ ИКТ ЭКЗАМЕН 10 ВОПРОСОВ

ЕРАСЫЛ АХМЕТОВ ИКТ ЭКЗАМЕН 10 ВОПРОСОВ

University

10 Qs

Second Part

Second Part

University

10 Qs

SADM CHAPTER 12

SADM CHAPTER 12

University

10 Qs

Test

Test

12th Grade - University

8 Qs

CNAG | Cybersecuity

CNAG | Cybersecuity

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

ALBERT VENDIOLA

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the main goals of cybersecurity?

CIA: Classified, Intelligence, Authorization

CIA: Centralized, Integrity, Accessible

CIA: Confidentiality, Integrity, Availability

CIA: Containability, Integrity, Authentication

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is goal of cybersecurity that is related to secrecy?

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the assessment type that refers to carrying out the project within the network?

Internal Network Assessment

Inner Operability Network Assessment

External Network Assessment

Exposed Network Assessment

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What the testing method that provides you the broad view of the network?

Black box testing

White box testing

Gray box testing

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What the testing method that provides you the broad view of the network?

Documentation-Reconnaissance-Post

Exploitation-Remediation

Scanning-Assessment-Patching-Validation

Discover-Vulnerability Assessment-Exploit-Post Exploitation