INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

1st - 10th Grade

10 Qs

quiz-placeholder

Similar activities

MODULE 9 PRE-TEST

MODULE 9 PRE-TEST

10th Grade

10 Qs

5. E-safety

5. E-safety

5th Grade

10 Qs

Python lesson 3

Python lesson 3

8th Grade

11 Qs

ULANGAN HARIAN Semester 2

ULANGAN HARIAN Semester 2

10th Grade

12 Qs

Fechando o Bimestre 6º ano

Fechando o Bimestre 6º ano

6th Grade

11 Qs

Latihan Soal PTS Kelas 6 Semester 1

Latihan Soal PTS Kelas 6 Semester 1

10th Grade

10 Qs

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

10th Grade

15 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

Assessment

Quiz

Computers

1st - 10th Grade

Practice Problem

Hard

Created by

NOR HANINA

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WHAT IS COMPUTER SECURITY

measures to protect data during transmission across the network.

generic name for the collection of tools designed to protect data and to prevent hackers.

measures to protect data during their transmission over a collection of interconnected networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three aspects of information security EXCEPT:

security attack

SECURITY MECHANISM

SECURITY SERVICES

NETWORK SECURITY

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK:

ANY ACTION THAT COMPROMISES THE SECURITY OF INFORMATION THAT OWNED BY ORGANIZATION

A MECHANISM THAT IS DESIGNED TO DETECT,TO PREVENT OR RECOVER FROM SECURITY ATTACK

A SERVICES THAT ENHANCES THE SECURITY OF DATA PROCESSING SYSTEM AND INFORMATION TRANSFER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY SERVICES EXCEPT

CONFIDENTIALITY

AUTHENTICATION

NON REPUDIATION

INTERCEPTION

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK

AUTHENTICATION

MODIFICATION

FABRICATION

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Modification of data stream

PAASIVE ATTACK

ACTIVE ATTACK

MODIFY ATTACK

SECURITY ATTACK

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

programs can be installed on computer systems to observe traffic, storing information (ID/Passwords) that can be used to access other systems.

DENIAL OF SERVICES

HACKING

SNIFFING

PORT SCANNING

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?