CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

quiz-placeholder

Similar activities

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Introduction to Network Security - Episode 1

Introduction to Network Security - Episode 1

University

10 Qs

QUIZ 3- BAEN/ITED

QUIZ 3- BAEN/ITED

University

10 Qs

InfoSec: C.I.A. Triangle

InfoSec: C.I.A. Triangle

10th Grade - University

10 Qs

Quiz  Cybersecurity Audit

Quiz Cybersecurity Audit

University

15 Qs

[Quiz] C1 - Security Concepts & Models

[Quiz] C1 - Security Concepts & Models

University

10 Qs

CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

University

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

Assessment

Quiz

Computers

University

Hard

Created by

N M

Used 20+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3 objectives of computer security is reliability, confidentiality and integrity.

true

false

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The followings are assets of computer system except:

hardware

data

software

user

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

when computer does the wrong thing or gives wrong answers, refers to:

spoil

leaky

corrupted

idle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Active attack is __________.

protect active apps

attack the malware

attack active computer hardware

alter system resources

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers range from amateur pranksters to organized criminals, international terrorists, and hostile governments are called ______.

outside attack

system attack

organized attack

inside attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major threat to computer system hardware is the threat to availability.

true

false

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

software modification that results in a program that still functions   but that behaves differently than before, which is a threat to ______.

reliability

availability

integrity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?