[Quiz] C1 - Security Concepts & Models

[Quiz] C1 - Security Concepts & Models

University

10 Qs

quiz-placeholder

Similar activities

Software Engineering

Software Engineering

University

10 Qs

Quiz Public Speaking Pert. 10

Quiz Public Speaking Pert. 10

University

15 Qs

STEAM 教育

STEAM 教育

3rd Grade - University

12 Qs

introduction to computer graphics

introduction to computer graphics

University

10 Qs

Dia1: Curso Comercialización de Servicios

Dia1: Curso Comercialización de Servicios

University

10 Qs

Quiz-2

Quiz-2

University

12 Qs

Introduction to Django Framework Quiz

Introduction to Django Framework Quiz

University

15 Qs

[Quiz] C1 - Security Concepts & Models

[Quiz] C1 - Security Concepts & Models

Assessment

Quiz

Education, Professional Development, Computers

University

Easy

Created by

Mohd Hanis

Used 9+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is Digital Footprint?

Footprint left at the beach

Data trail on the internet

A Malware

What's in the internet never stays forever

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What is Passive Digital Footprint?

data you leave when you make deliberate choices on the internet

data files that you left on your computer

data that has been analyzed for future use

data that you leave behind without intending to or, in some cases, without knowing it.

3.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

How to Minimize your Digital Footprint? (Choose more than 1 answer)

Search yourself using Google Search

Check your data breach through Have I Been Pwned site

Use Google Alert to notify in case your data has been breached without your intention

Do not check your privacy setting, just use the default setting

4.

MULTIPLE SELECT QUESTION

30 sec • 10 pts

Which sites are stealth mode browser?

Tor Internet Browser

Cognitio Mode in Google Chrome

InPrivate Browsing in Microsoft Edge

Private Window in Firefox

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which is NOT the goals of Information Security?

Prevention

Detection

Recovery

Redirect

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

An event or action that could potentially cause damage to an asset is called?

Vulnerabilities

Threats

Attack

Incident Response

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Countermeasures put in place to avoid, mitigate, or counteract security threats is called?

Disaster Recovery

Incident Response

Controls

CIA Triad

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?