Cys quiz 1

Cys quiz 1

University

25 Qs

quiz-placeholder

Similar activities

Chapter 8. Securing Network Media and Devices

Chapter 8. Securing Network Media and Devices

University

20 Qs

Intro to Data Networking and the Internet - Prelim Exam

Intro to Data Networking and the Internet - Prelim Exam

University

20 Qs

NETWORKING

NETWORKING

University

20 Qs

Basics of Networking

Basics of Networking

University

25 Qs

Network Security

Network Security

University

20 Qs

Basic of Computer Networks - Quiz1

Basic of Computer Networks - Quiz1

University

20 Qs

Pre-Assessment: Distributed Systems III

Pre-Assessment: Distributed Systems III

University

20 Qs

Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

University

20 Qs

Cys quiz 1

Cys quiz 1

Assessment

Quiz

Computers

University

Easy

Created by

Sajjad Al-Sulaiman

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the computer program 'CREEPER' during the 1970s?

Bob kahn

Cristiano Ronaldo

Bob Thomas

Lionel Messi

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Reaper is considered as the first example of ………?

Firewall software

Group policy system

Antimalware software

Antivirus software

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the first firewall program design in response to a computer virus attack?

A NASA researcher

A computer programmer

A network administrator

A cybersecurity expert

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What was the response of governments towards hacking in the early 2000s?

Governments imposed lighter penalties for hacking.

Governments ignored the issue of hacking.

Governments implemented stricter regulations on cybersecurity.


Governments impose serious sentences, including extensive jail time.


5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of Standards for achieving information security?

Access to network resources will be through unique user ID and password.

Passwords will be 10 characters.

Passwords should include one non-alpha and not found in dictionary.

Regular software updates should be performed.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Integrity means keeping sensitive information …….?

Private and secure.

Accessible when needed.

Altered and inconsistent.

Completed and accurate.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following is considered as benefit of information security?

Compliance

Maintenance.

Resistance to change.

Cost.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?