Chapter1

Chapter1

University

18 Qs

quiz-placeholder

Similar activities

Chapter 6 Database

Chapter 6 Database

University

16 Qs

chapter 3 - Network & Security Overview

chapter 3 - Network & Security Overview

University

13 Qs

U4 Cloud Computing

U4 Cloud Computing

University

17 Qs

Quiz on Misinformation and Bias

Quiz on Misinformation and Bias

10th Grade - University

18 Qs

Kuis IoT 2

Kuis IoT 2

University

20 Qs

The Internet

The Internet

University

20 Qs

9. الاستعراض الآمن

9. الاستعراض الآمن

University

21 Qs

Database Solution Development Quiz

Database Solution Development Quiz

University

14 Qs

Chapter1

Chapter1

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

SYAKIRA WAHAB

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?

can span several years

targets sensitive proprietary information

uses advanced tools and techniques

is only used by hactivists against foreign enemies

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following was used to describe attackers who would break into a computer system without the owner’s permission and publicly disclose the vulnerability?

white hat hackers

black hat hackers

blue hat hackers

gray hat hackers

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which the following is NOT a reason why it is difficult to defend against today’s

attackers?

increased speed of attacks

simplicity of attack tools

greater sophistication of defense tools

delays in security updating

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why can brokers command such a high price for what they sell?

Brokers are licensed professionals

The attack targets are always wealthy corporations

The vulnerability was previously unknown and is unlikely to be patched quickly

Brokers work in teams and all the members must be compensated.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which phrase describes the term “security” in a general sense?

protection from only direct actions

using reverse attack vectors (RAV) for protection

only available on hardened computers and systems

the necessary steps to protect a person or property from harm

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______ ensures that only authorized parties can view the information.

Confidentiality

Availability

Authorization

Integrity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Each of the following is a successive layer in which information security is achieved

EXCEPT ___________.

products

purposes

procedures

people

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers