Introduction to Computer Security

Introduction to Computer Security

University

28 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

1st Grade - Professional Development

25 Qs

Cys quiz 1

Cys quiz 1

University

25 Qs

STC - Cyber Security and Forensics

STC - Cyber Security and Forensics

University

30 Qs

ITSY201-Fundamentals of computer security-Practice Chapter 1 2 3

ITSY201-Fundamentals of computer security-Practice Chapter 1 2 3

University

30 Qs

Information assurance and security

Information assurance and security

University

25 Qs

UTS Keamanan Sistem A

UTS Keamanan Sistem A

University

30 Qs

Data Security Breach

Data Security Breach

University

33 Qs

Systems Administration Final Exam

Systems Administration Final Exam

University

30 Qs

Introduction to Computer Security

Introduction to Computer Security

Assessment

Quiz

Science, Mathematics, Computers

University

Medium

Created by

Rasika Sawant

Used 52+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________________ is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

Computer security

Network security

Cyber Forensics

Network Forensics

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Message ________ means that the sender and the receiver expect privacy.

confidentiality

integrity

authentication

none of the above

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Message_____ means that the data must arrive at the receiver exactly as sent.

confidentiality

integrity

authentication

none of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

confidentiality

integrity

authentication

none of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ means that a sender must not be able to deny sending a message that he sent.

confidentiality

integrity

authentication

Non repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Confidentiality, Integrity, and Availability are the three main things used to evaluate information security.

CIA Triad

Baiting

Security Triad

none of the above

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A loss of _____________ is the unauthorized disclosure of information.

confidentiality

Integrity

Authentication

Nonrepudiation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?