SIC quiz 2

SIC quiz 2

University

18 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

L1 - Computer Networks

L1 - Computer Networks

University

13 Qs

NETWORK SECURITY

NETWORK SECURITY

University

20 Qs

Administrasi Infrastruktur Jaringan (XII) Firewall

Administrasi Infrastruktur Jaringan (XII) Firewall

University

20 Qs

Cybersecurity Exam 2 Practice

Cybersecurity Exam 2 Practice

University

23 Qs

ADMINISTRASI INFRASTRUKTUR JARINGAN XII TKJ

ADMINISTRASI INFRASTRUKTUR JARINGAN XII TKJ

University

20 Qs

Cyber security Quiz

Cyber security Quiz

University

20 Qs

Networking 1 Day 7 Review

Networking 1 Day 7 Review

University

20 Qs

SIC quiz 2

SIC quiz 2

Assessment

Quiz

Computers

University

Hard

Created by

SHILPA NIMBRE

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The attack surface of the operating system is

reduced by _____________

Installing unnecessary

software

Disabling unneeded

services

Allowing access to

everyone

Giving administrative

privileges to everyone.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Authentication ?

Encryption

Proof of Identity

Access

Access

Modification

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which among the following is a method that could be implemented to minimize the

risk of a successful attack?

Creating a computer security defense plan

By sharing passwords with unknown people

By allowing mobile codes to be run without malware scanning

By not using firewall

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

SSL stands for?

Secured Socket Layer

Secured Shell Layer

System Socket Layer

System Secured Layer

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______attempt to guess a password by trying all the character combinations

listed in an accompanying dictionary

Brute-force tools

File-system transversal

SQL injection attack

Permutation

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In computer security, ……………………. means that computer system assets can be

modified only by authorized parities

Confidentiality

Integrity

Availability

Authenticity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

__________ is the act of capturing packets of data flowing across a computer network

packet catching

packet snipping

packet sniffing

packet pulling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?