
class-2
Quiz
•
Other
•
University
•
Practice Problem
•
Medium
adam ali
Used 1+ times
FREE Resource
Enhance your content in a minute
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Anti-virus
Firewall
Encryption
Malware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Cyber criminal
Phishing
Attack password
Online predator
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?
Consistency
Confidentiality
Content
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?
Data at rest, like the files stored on their computers
Data in transit, like emails they are sending to each other
Data in process, like the data being used by their software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?
Encryption
Hashing
Access Control
Authentication
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Benjamin is working on a project to ensure data integrity. Which technology is the most used example of integrity in this context?
Firewalls
Hashing
Authentication
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe sending packets or requests to another system to gain information to be used in a subsequent attack?
Risk analysis
Risk assessment
Scanning
Spear Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
32 questions
Understanding Strings and Arrays
Quiz
•
University
30 questions
TIU 1
Quiz
•
University
26 questions
Cuestionario de Fundamentos del Desarrollo Cognitivo
Quiz
•
University
27 questions
Corporate Accounting - Formation of Company
Quiz
•
University
26 questions
Quiz 1 - ISPM2 3B
Quiz
•
University
27 questions
Test
Quiz
•
University
27 questions
Economics Exam 1 Review
Quiz
•
University
27 questions
Statistics Chapter 6
Quiz
•
12th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
5 questions
Helping Build the Internet: Valerie Thomas | Great Minds
Interactive video
•
11th Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
19 questions
Review2-TEACHER
Quiz
•
University
15 questions
Pre2_STUDENT
Quiz
•
University
20 questions
Ch. 7 Quadrilateral Quiz Review
Quiz
•
KG - University
