CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

quiz-placeholder

Similar activities

Komponen Jaringan & Pengkabelan

Komponen Jaringan & Pengkabelan

University

15 Qs

Basic on Operating System

Basic on Operating System

University

10 Qs

Quiz Webinar GNS3

Quiz Webinar GNS3

10th Grade - University

13 Qs

Enterprise development - JEE

Enterprise development - JEE

University

10 Qs

kuis cepat sejarah perkembangan komputer

kuis cepat sejarah perkembangan komputer

University

10 Qs

Evaluasi Pertemuan 12 DRPL TI-3B

Evaluasi Pertemuan 12 DRPL TI-3B

University

15 Qs

ER MODEL

ER MODEL

University

15 Qs

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

6th Grade - Professional Development

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

Assessment

Quiz

Computers

University

Hard

Created by

N M

Used 20+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3 objectives of computer security is reliability, confidentiality and integrity.

true

false

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The followings are assets of computer system except:

hardware

data

software

user

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

when computer does the wrong thing or gives wrong answers, refers to:

spoil

leaky

corrupted

idle

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Active attack is __________.

protect active apps

attack the malware

attack active computer hardware

alter system resources

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers range from amateur pranksters to organized criminals, international terrorists, and hostile governments are called ______.

outside attack

system attack

organized attack

inside attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major threat to computer system hardware is the threat to availability.

true

false

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

software modification that results in a program that still functions   but that behaves differently than before, which is a threat to ______.

reliability

availability

integrity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?