Cyber security (OE)

Cyber security (OE)

University

10 Qs

quiz-placeholder

Similar activities

OSI Model

OSI Model

University

15 Qs

Evaluasi AIJ

Evaluasi AIJ

12th Grade - University

10 Qs

TEKNOLOGI LAYANAN JARINGAN (XI TKJ)

TEKNOLOGI LAYANAN JARINGAN (XI TKJ)

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

Matkul Sistem Terdistribusi

Matkul Sistem Terdistribusi

University

13 Qs

Mech Dt 7 Qz 3

Mech Dt 7 Qz 3

University

10 Qs

Security Awareness Quiz

Security Awareness Quiz

University

15 Qs

What is Adware?

What is Adware?

KG - Professional Development

7 Qs

Cyber security (OE)

Cyber security (OE)

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Vijayakumar Rajarathinam

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Forged source address is also called as ____________.

Source spoofing

Source malware attack

Source address spoofing

SYN Spoofing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker uses malware to subvert the system and install an attack agent which they can control. Such systems are known as

Denial of Service attack

DDoS

Dictionary Attack

Zombies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which One of them is Passive attack?

Denial of Service

Modify message in transit

Replay previous message

Obtain message contain

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SSL primarily focuses on _______ .

Integrity and Authenticity

Integrity and non-repudiation

Authenticity and privacy

Confidentiality and integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

Antivirus

Network security

IDS

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A proxy firewall filers at

Physical Layer

Data Link Layer

Network Layer

Application Layer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection against Denial by one of these parties in a communication refers to?

Reputation

Data integrity

Authentication

Non-Repudiation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?