Nguyên lý an toàn thông tin

Nguyên lý an toàn thông tin

University

28 Qs

quiz-placeholder

Similar activities

Introduction to Information Systems Chapter 1

Introduction to Information Systems Chapter 1

University

24 Qs

Planning and Decision Making Quiz

Planning and Decision Making Quiz

University

29 Qs

Project Management Concepts Quiz

Project Management Concepts Quiz

University

29 Qs

Intrusion Detection and Prevention Systems Quiz

Intrusion Detection and Prevention Systems Quiz

University

29 Qs

Chapter 1 - Fundamentals of software testing

Chapter 1 - Fundamentals of software testing

University

30 Qs

Knowledge Assessment Quiz

Knowledge Assessment Quiz

8th Grade - University

30 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

29 Qs

Software Engineering Quiz

Software Engineering Quiz

University

28 Qs

Nguyên lý an toàn thông tin

Nguyên lý an toàn thông tin

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Vân Cẩm

Used 4+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of security in the context of information
systems?

Enhancing system speed

Maximizing resource utilization

Ensuring confidentiality, integrity, Non-repudiation and availability

Minimizing software complexity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "confidentiality" mean in the context of
security?

nsuring data is accurate and unaltered

Protecting data from unauthorized access

Maximizing system performance

Preventing data loss during hardware failures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a security measure to ensure
"integrity"?

Firewalls

Antivirus software

Data encryption

Digital signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a "Denial of Service" (DoS) attack?

Unauthorized access to sensitive data

Altering data without detection

Disrupting or degrading system availability

Bypassing firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves tricking individuals into divulging
sensitive information, such as passwords or credit card numbers?

Denial of Service (DoS)

. Spoofing

Phishing

. Man-in-the-Middle (MitM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a "Brute Force" attack in information
security?

Gaining unauthorized access by exploiting system vulnerabilities

Decrypting encrypted data through trial and error

Disrupting network communication

. Infecting systems with malicious software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a "Zero-Day" exploit?

a. It targets previously unknown vulnerabilities

b. It relies on social engineering techniques

c. It only affects outdated software

d. It requires physical access to the target system

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?