EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

55 Qs

quiz-placeholder

Similar activities

MIL for Completion

MIL for Completion

12th Grade

60 Qs

REVIEW TEST MEDIA AND INFORMATION LITERACY

REVIEW TEST MEDIA AND INFORMATION LITERACY

12th Grade - University

50 Qs

kuis  Jaringan Internet

kuis Jaringan Internet

9th Grade - University

50 Qs

ICT EASY EXAM

ICT EASY EXAM

11th - 12th Grade

50 Qs

Microsoft Word/Powerpoint M1:L1-6

Microsoft Word/Powerpoint M1:L1-6

9th - 12th Grade

60 Qs

eSkill-8

eSkill-8

12th Grade

54 Qs

Intro To Networking 123

Intro To Networking 123

9th - 12th Grade

53 Qs

CSEC IT- Past Paper MCQ- 2020

CSEC IT- Past Paper MCQ- 2020

12th Grade

60 Qs

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information security?

Ease of use

Well-being of information and infrastructure

Increasing network speed

Reducing software costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an element of information security?

Confidentiality

Integrity

Usability

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a challenge in information security?

Abundance of cybersecurity professionals

Simple privacy regulations

Compliance with government laws and regulations

Easy centralization of security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a motive behind information security attacks?

Enhancing user experience

Disrupting business continuity

Improving software functionality

Increasing network bandwidth

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of passive attacks?

Tampering with data in transit

Intercepting and monitoring network traffic

Using privileged access to violate rules

Tampering with hardware or software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an active attack?

Sniffing and eavesdropping

Footprinting

Man-in-the-Middle

Network traffic analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves using privileged access to violate rules?

Passive Attack

Insider Attack

Distribution Attack

Close-in Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?