красотканаргизаа

красотканаргизаа

University

60 Qs

quiz-placeholder

Similar activities

Information Technology Career Paths Revision 1-15

Information Technology Career Paths Revision 1-15

University

60 Qs

FINANCIAL MANAGEMENT

FINANCIAL MANAGEMENT

University

60 Qs

LCEF. 1B. Inglés 1

LCEF. 1B. Inglés 1

University

61 Qs

xxxReady for IELTS 2nd ed. Unit 03 Reading

xxxReady for IELTS 2nd ed. Unit 03 Reading

12th Grade - Professional Development

60 Qs

săn đây CSI104

săn đây CSI104

University

60 Qs

PRE Lesson 14 HW (Revision for FINAL - GK)

PRE Lesson 14 HW (Revision for FINAL - GK)

University

60 Qs

Anh văn ck2

Anh văn ck2

12th Grade - University

60 Qs

môn BRA lần 3:))))))))

môn BRA lần 3:))))))))

University

60 Qs

красотканаргизаа

красотканаргизаа

Assessment

Quiz

English

University

Medium

Created by

Наргиза Кайырбекова

Used 98+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is the name of a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

 Spyware

 Firewall

 Virus

 Norton

 intrusion detection  

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Encryption information is…:

A conversion process in which information is deleted.

The process of its transformation, in which the content of information is changed to a false

The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects

The process of converting information into machine code

Identification protocol

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Software information protection

cryptography

uninterrupted power supply unit

backup

data duplication

Desepticons invasion

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Ensuring the accuracy and completeness of information and methods of its processing.

Confidentiality

Integrity 

Availability

Feasibility

Dr. Web

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Providing access to information only to authorized users?

Privacy

integrity

Availability

Feasibility

Dr. Web

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 The greatest threat to network security pose

opening standard user account

opening of the standard account administrator group

copying files that have been changed during the day, without a backup mark

main menu

unauthorized access, electronic eavesdropping and intentional or unintentional damage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is Information Security?

PC security measures

the security of personal information

Identification protocol

Measures to protect information from unauthorized access

Software update

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?