class-2

class-2

University

31 Qs

quiz-placeholder

Similar activities

Business Communication - Chapter 2

Business Communication - Chapter 2

University

26 Qs

CHAPTER 8: COMMUNICATION

CHAPTER 8: COMMUNICATION

University

26 Qs

GEED12 - Philippine Popular Culture

GEED12 - Philippine Popular Culture

University

26 Qs

Packaging & Materials Handling

Packaging & Materials Handling

University

26 Qs

Q1: Introduction to Dental Informatics Definition, Scope and Imp

Q1: Introduction to Dental Informatics Definition, Scope and Imp

University

30 Qs

3: Neural and Hormonal Systems

3: Neural and Hormonal Systems

University

26 Qs

BIM 1 Study Practice Test

BIM 1 Study Practice Test

10th Grade - University

27 Qs

class-2

class-2

Assessment

Quiz

Other

University

Medium

Created by

adam ali

Used 1+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Anti-virus

Firewall

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Cyber criminal

Phishing

Attack password

Online predator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?

Consistency

Confidentiality

Content

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?

Data at rest, like the files stored on their computers

Data in transit, like emails they are sending to each other

Data in process, like the data being used by their software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?

Encryption

Hashing

Access Control

Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Benjamin is working on a project to ensure data integrity. Which technology is the most used example of integrity in this context?

Firewalls

Hashing

Authentication

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe sending packets or requests to another system to gain information to be used in a subsequent attack?

Risk analysis

Risk assessment

Scanning

Spear Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?