Topic 1 : Introduction to Computer, Network & Security

Topic 1 : Introduction to Computer, Network & Security

University

15 Qs

quiz-placeholder

Similar activities

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

Computer and Other Human Inventions

Computer and Other Human Inventions

University

15 Qs

Robotics Prelim

Robotics Prelim

University

15 Qs

Test PKS 1 - Modul 2

Test PKS 1 - Modul 2

University

20 Qs

Soal AIJ bulan Agustus 2019 kls xii

Soal AIJ bulan Agustus 2019 kls xii

University

20 Qs

AWS compute services

AWS compute services

University

17 Qs

Information Technology

Information Technology

University

17 Qs

ADB Quiz #1

ADB Quiz #1

University

15 Qs

Topic 1 : Introduction to Computer, Network & Security

Topic 1 : Introduction to Computer, Network & Security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

NURANISAH (KKHSE)

Used 28+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware programmability to accept data (input), process it, and then produce outputs

Computer

Network

Network Security

Network Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network is a group of two or more computers or other electronic   devices that are interconnected for the purpose of exchanging data and sharing resources

Computer

Network

Network Security

Network Threat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojans are not capable of which of the following?

  • Stealing data

  • Stealing financial information

  • Self-replicating

  • Stealing login credentials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is security threat?

Comparatively hard to detect

Comparatively easy to detect

Objective is to cause damage

Initiated by system itself as well as outsider

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is security attack?

Comparatively hard to detect

May or may not be malicious

Objective is to cause damage

Initiated by system itself as well as outsider

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sources of security threats, except:

External

Internal

Structured

Outsider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of network security attacks, except:

Reconnaissance Attack

Access Attack

Theft

Denial of Service Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?