Cyber forensic and security

Cyber forensic and security

University

15 Qs

quiz-placeholder

Similar activities

UIT 2221 MALWARE (COPTPA)

UIT 2221 MALWARE (COPTPA)

University

15 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

Living in the IT Era - Q1

Living in the IT Era - Q1

University

15 Qs

Hackers?

Hackers?

University

20 Qs

QUIZ 3- BAEN/ITED

QUIZ 3- BAEN/ITED

University

10 Qs

Introduction to Network Security - Episode 1

Introduction to Network Security - Episode 1

University

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Cyber forensic and security

Cyber forensic and security

Assessment

Quiz

Computers

University

Hard

Created by

Hitesh Grewal

Used 9+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of encoding information in a way so that only someone with a key can decode it?

Compression

Systemic variation

Encryption

Data Encapsulation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine if customers of a bank are unable to access its account resources than which objective of security will be compromised here.

Authenticity

Availability.

Integrity.

Confidentiality.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.

Worm

Virus

Zombie

Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is independent malicious program that need not any host program?

Trap doors

Trojan horse

Virus

Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malicious program do not replicate automatically?

Trojan Horse

Virus

Worm

Zombie

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?