Introduction to Computer Security

Introduction to Computer Security

University

28 Qs

quiz-placeholder

Similar activities

IP Addressing

IP Addressing

University

24 Qs

python-2

python-2

University

23 Qs

MID DSS

MID DSS

University

23 Qs

Object-Oriented Design Final Exam

Object-Oriented Design Final Exam

University

23 Qs

Cloudwatch

Cloudwatch

1st Grade - University

23 Qs

3rd grade SCIENCE Machines and inventions

3rd grade SCIENCE Machines and inventions

2nd Grade - University

24 Qs

Information Assurance and Security - Prelim Quiz

Information Assurance and Security - Prelim Quiz

University

25 Qs

Introduction to Computer Security

Introduction to Computer Security

Assessment

Quiz

Science, Mathematics, Computers

University

Practice Problem

Medium

Created by

Rasika Sawant

Used 54+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________________ is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

Computer security

Network security

Cyber Forensics

Network Forensics

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Message ________ means that the sender and the receiver expect privacy.

confidentiality

integrity

authentication

none of the above

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Message_____ means that the data must arrive at the receiver exactly as sent.

confidentiality

integrity

authentication

none of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

confidentiality

integrity

authentication

none of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ means that a sender must not be able to deny sending a message that he sent.

confidentiality

integrity

authentication

Non repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Confidentiality, Integrity, and Availability are the three main things used to evaluate information security.

CIA Triad

Baiting

Security Triad

none of the above

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A loss of _____________ is the unauthorized disclosure of information.

confidentiality

Integrity

Authentication

Nonrepudiation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Science