SIC quiz 2

SIC quiz 2

University

18 Qs

quiz-placeholder

Similar activities

Cybersecurity Exam 2 Practice

Cybersecurity Exam 2 Practice

University

23 Qs

Cyber EOP - DoS, DDoS & Zero-Day DDoS By Mr. B

Cyber EOP - DoS, DDoS & Zero-Day DDoS By Mr. B

12th Grade - University

18 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

Itec285 End of Year

Itec285 End of Year

University

17 Qs

Exploit Techniques and Hacking Concepts

Exploit Techniques and Hacking Concepts

University

20 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

cyber awareness

cyber awareness

University

20 Qs

SIC quiz 2

SIC quiz 2

Assessment

Quiz

Computers

University

Hard

Created by

SHILPA NIMBRE

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The attack surface of the operating system is

reduced by _____________

Installing unnecessary

software

Disabling unneeded

services

Allowing access to

everyone

Giving administrative

privileges to everyone.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Authentication ?

Encryption

Proof of Identity

Access

Access

Modification

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which among the following is a method that could be implemented to minimize the

risk of a successful attack?

Creating a computer security defense plan

By sharing passwords with unknown people

By allowing mobile codes to be run without malware scanning

By not using firewall

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

SSL stands for?

Secured Socket Layer

Secured Shell Layer

System Socket Layer

System Secured Layer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______attempt to guess a password by trying all the character combinations

listed in an accompanying dictionary

Brute-force tools

File-system transversal

SQL injection attack

Permutation

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In computer security, ……………………. means that computer system assets can be

modified only by authorized parities

Confidentiality

Integrity

Availability

Authenticity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

__________ is the act of capturing packets of data flowing across a computer network

packet catching

packet snipping

packet sniffing

packet pulling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?