Long Quiz #1 - SD3A, SD3B Computer Security

Long Quiz #1 - SD3A, SD3B Computer Security

University

21 Qs

quiz-placeholder

Similar activities

SPCC ISE 2 Quiz TE B

SPCC ISE 2 Quiz TE B

University

20 Qs

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

FNaF 2

FNaF 2

5th Grade - University

24 Qs

Python MCQ

Python MCQ

University

20 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

CIS2303 Week 4_5 Ch_3

CIS2303 Week 4_5 Ch_3

University

18 Qs

Level 2 Digital Technologies

Level 2 Digital Technologies

8th Grade - Professional Development

18 Qs

Python Functions and File Operations Quiz cyber 2025

Python Functions and File Operations Quiz cyber 2025

University

18 Qs

Long Quiz #1 - SD3A, SD3B Computer Security

Long Quiz #1 - SD3A, SD3B Computer Security

Assessment

Quiz

Computers

University

Easy

Created by

Benjamin Delgado

Used 8+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The thief makes a copy of the file for himself and leave the original on your computer.

Information can be copied and

Information can be Stolen

Information can be hacked remotely

Information can be stored

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A thief who steals computer files may leave the files on your computer and only copy them for himself.

 

Information can be copied and sold  

Information can be Stolen

Information is everywhere

Information can be hacked remotely

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is possible to hack into computer systems remotely from anywhere in the world.

Information can be copied and sold  

Information can be Stolen

Information can be hacked remotely

You can give information to anyone

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is designed and being implemented to prevent, detect and resolve the unauthorised actions by its users and external actors.

Filing System

Networking System

Security System

Navigating System

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the prevention of unauthorised disclosure of information.

Integrity

Confidentiality

Authentication

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the prevention of unauthorised writing or modification of information.

Access Control

Availability

Integrity

Non-Repudiation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the prevention of unauthorised with-holding of information.

Information should be accessible and usable upon appropriate demand by an

authorised user.

Confidentiality

Access Control

Non-Repudiation

Availability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?