Topic 1 : Introduction to Computer, Network & Security

Topic 1 : Introduction to Computer, Network & Security

University

15 Qs

quiz-placeholder

Similar activities

Networks and Computer Attacks

Networks and Computer Attacks

University

15 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

Cyber forensic and security

Cyber forensic and security

University

15 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

iCIO Contribute - Binus University

iCIO Contribute - Binus University

University

10 Qs

Hackers?

Hackers?

University

20 Qs

Layers Security

Layers Security

University

20 Qs

Cyber Security Quiz

Cyber Security Quiz

6th Grade - University

11 Qs

Topic 1 : Introduction to Computer, Network & Security

Topic 1 : Introduction to Computer, Network & Security

Assessment

Quiz

Computers

University

Hard

Created by

NURANISAH (KKHSE)

Used 28+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware programmability to accept data (input), process it, and then produce outputs

Computer

Network

Network Security

Network Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network is a group of two or more computers or other electronic   devices that are interconnected for the purpose of exchanging data and sharing resources

Computer

Network

Network Security

Network Threat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojans are not capable of which of the following?

  • Stealing data

  • Stealing financial information

  • Self-replicating

  • Stealing login credentials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is security threat?

Comparatively hard to detect

Comparatively easy to detect

Objective is to cause damage

Initiated by system itself as well as outsider

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is security attack?

Comparatively hard to detect

May or may not be malicious

Objective is to cause damage

Initiated by system itself as well as outsider

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sources of security threats, except:

External

Internal

Structured

Outsider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of network security attacks, except:

Reconnaissance Attack

Access Attack

Theft

Denial of Service Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers