
Security Intelligence Quiz
Authored by DILLIP KUMAR
Education
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following observe each activity on the internet of the victim, gather all information in the background ?
Malware
Adware
Spyware
All of the above
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
software program or a hardware that filters all data packets coming through the internet, a network, etc. known as
Antivirus
Firewall
Cookies
Malware
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
Piracy
Intellectual Property Rights
Plagiarism
All of Above
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is refers to exploring the appropriate, ethical behaviors related to the online environment and digital media?
Cyber Law
CyberEthics
Cybersecurity
Cybersafety
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following refers to the violation of the principle if a computer is no more accessible?
Access control
Confidentiality
Availability
All of the above
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In which category does the lack access control policy fall?
Threat
Bug
Attack
Vulnerability
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Full form of TCP/IP?
transmission control protocol / internet protocol
telephone call protocol / international protocol
transport control protocol / internet protocol
transition control protocol / internet protocol
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?