INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

1st - 10th Grade

10 Qs

quiz-placeholder

Similar activities

computer security

computer security

KG - 12th Grade

12 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Threat prevention

Threat prevention

10th Grade

8 Qs

Understanding the CIA Triad in Cyber Security

Understanding the CIA Triad in Cyber Security

7th Grade

15 Qs

Implications of Cloud Technologies

Implications of Cloud Technologies

10th - 11th Grade

15 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

L3 - Cyber Security

L3 - Cyber Security

8th Grade

14 Qs

INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

Assessment

Quiz

Computers

1st - 10th Grade

Hard

Created by

NOR HANINA

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WHAT IS COMPUTER SECURITY

measures to protect data during transmission across the network.

generic name for the collection of tools designed to protect data and to prevent hackers.

measures to protect data during their transmission over a collection of interconnected networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three aspects of information security EXCEPT:

security attack

SECURITY MECHANISM

SECURITY SERVICES

NETWORK SECURITY

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK:

ANY ACTION THAT COMPROMISES THE SECURITY OF INFORMATION THAT OWNED BY ORGANIZATION

A MECHANISM THAT IS DESIGNED TO DETECT,TO PREVENT OR RECOVER FROM SECURITY ATTACK

A SERVICES THAT ENHANCES THE SECURITY OF DATA PROCESSING SYSTEM AND INFORMATION TRANSFER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY SERVICES EXCEPT

CONFIDENTIALITY

AUTHENTICATION

NON REPUDIATION

INTERCEPTION

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK

AUTHENTICATION

MODIFICATION

FABRICATION

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Modification of data stream

PAASIVE ATTACK

ACTIVE ATTACK

MODIFY ATTACK

SECURITY ATTACK

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

programs can be installed on computer systems to observe traffic, storing information (ID/Passwords) that can be used to access other systems.

DENIAL OF SERVICES

HACKING

SNIFFING

PORT SCANNING

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?