Theory Test 1

Theory Test 1

University

25 Qs

quiz-placeholder

Similar activities

Mitigating Data Loss

Mitigating Data Loss

University

20 Qs

Week 15 - Module 5 Unit 2 Using Best Practice

Week 15 - Module 5 Unit 2 Using Best Practice

University

20 Qs

IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

University

25 Qs

Network Defence

Network Defence

University

20 Qs

SYO 701 INTRO TO SECURITY Module FC-2

SYO 701 INTRO TO SECURITY Module FC-2

University

20 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Computer Software and Hardware Quiz

Computer Software and Hardware Quiz

University

20 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Theory Test 1

Theory Test 1

Assessment

Quiz

Computers

University

Hard

Created by

Muhammad Hafif

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Identify the method that transforms data into unreadable format to prevent unauthorized access.

Access control

Encryption

Data backup

Data classification

2.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Choose the example that represents a confidentiality breach.

Redundant servers

Unauthorized access to medical records

Routine system updates

Data consistency

3.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Select the component of integrity that ensures information is free from errors.

Data completeness

Data accuracy

Data leakage

Encryption

4.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Identify the factor that ensures information remains the same across multiple systems.

Data completeness

Data redundancy

Data consistency

Confidentiality

5.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Choose the best way to prevent unauthorized data modifications.

Rootkits

Access controls

Redundancy

Risk matrix

6.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

An insider threat could involve:

Phishing emails from outside attackers

Data theft by employees

Zero-day exploit

SQL injection

7.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Which is an example of social engineering?

Brute-force password guessing

Sending phishing emails

SQL injection

Protocol attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?