Introduction to IT Security

Introduction to IT Security

University

10 Qs

quiz-placeholder

Similar activities

GenElec1 Cybersecurity

GenElec1 Cybersecurity

University

10 Qs

QUIZ-group5

QUIZ-group5

University

10 Qs

ICYS5112 LU1 Quiz

ICYS5112 LU1 Quiz

University

15 Qs

OSS (QUIZ 8) Security and Protection

OSS (QUIZ 8) Security and Protection

University

15 Qs

Ethical Hacking week #1

Ethical Hacking week #1

University

10 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

Data Management and Storage

Data Management and Storage

University

10 Qs

Introduction to IT Security

Introduction to IT Security

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Lyle Lyle

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are the three main areas of IT security?

Network, Physical, Internet

Communication, Computer, Cloud

Antivirus, Firewall, VPN

Desktop, Server, Mobile

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What was the earliest form of communication security mainly trying to prevent?

Malware attacks

Email phishing

Physical tapping into communication lines

Social engineering

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is cryptography used for?

Speeding up internet

Blocking ads

Protecting against physical theft

Making information readable only to authorized users

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What changed in the 1960s that increased computer security risks?

Smaller hardware

Single-user systems

Time-sharing and resource-sharing systems

Emergence of mobile phones

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What’s one reason users lost control over their processing environment?

Multi-user access to one system

Computers became slower

Programs became too complex

Lack of electricity

6.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

What tools are commonly used for protecting communication security?

(Choose all that apply)

Firewall

Cryptography

Secure Transmission Protocols

Data Recovery Tools

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The need for security arose because of the growing number of ________ in the 1960s, which led to unauthorized data access.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)