
Security Fundamentals and Windows OS Security
Authored by Usha B A
Engineering
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Network Security provides authentication and access control for resources.
a) True
b) False
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of these is a part of network identification?
a) User ID
b) Password
c) OTP
d) fingerprint
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
d) Decrypted text
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
a) IP tracker
b) emails
c) websites
d) web pages
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In asymmetric encryption _____________
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?