CHAPTER 1

CHAPTER 1

University

12 Qs

quiz-placeholder

Similar activities

Data Science Intro

Data Science Intro

University

10 Qs

Big Data Quizz 2

Big Data Quizz 2

University

11 Qs

Komputer dan Masyarakat

Komputer dan Masyarakat

University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Program UMS SPRINT

Program UMS SPRINT

University

17 Qs

Sistem Jaringan Komputer

Sistem Jaringan Komputer

University

10 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

CIBERSEGURIDAD

CIBERSEGURIDAD

University

10 Qs

CHAPTER 1

CHAPTER 1

Assessment

Quiz

Computers

University

Medium

Created by

DR PALANIAPPAN

Used 5+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following are the threat assessment factors EXCEPT:

Attractiveness of the system

The nature of the information on the system

Traffic to the system

Capacity of data on the system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Determine whom the statement best describes? 

 

He is a programming expert who breaks into system security  with a malicious intent to steal data or to destroy the system.

White hat hacker

Script kiddy

Cracker

Gray hat hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data packet header contains following information EXCEPT.

Source IP address

Data

Packet size

type of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks aims to prevent legitimate users from accessing a system?

Denial of service

Social engineering

Worms

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of computer security?

To allow unauthorized access

To ensure data is destroyed

To increase network speed

To protect data integrity, confidentiality, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the concept of "confidentiality" in computer security?

Ensuring data is available when needed

Protecting data from unauthorized access

Guaranteeing that data is accurate

Allowing unrestricted data sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Phishing

DDoS

SQL Injection

Man-in-the-Middle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?