Chapter 16

Chapter 16

University

15 Qs

quiz-placeholder

Similar activities

Adobe Photoshop

Adobe Photoshop

University

10 Qs

basisdata1

basisdata1

University

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Memory-Mobo-Hard/Software

Memory-Mobo-Hard/Software

University

18 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

SQL Quiz

SQL Quiz

University

18 Qs

Chapter 16

Chapter 16

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Nguyễn Q Long

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describe being secure, information needs to be hidden from unauthorized access?

Confidentiality

Integrity

Availability

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes protecting data information needs to be protected from unauthorized change?

Confidentiality

Availability

Integrity

Deniel of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is threatening integrity?

Snooping

Traffic Analysis

Denial of service

Modification

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is threatening confidentiality?

Snooping

Repudiation

Denial of service

Modification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ can be threatened by security attacks.

confidentiality, cryptography, and non-repudiation

confidentiality, encryption, and decryption

confidentiality, denial of service, and masquerading

confidentiality, integrity, and availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In attacks threatening integrity, ______  happens when the attacker impersonates somebody else

Snooping

Modification

Masquerading

Denial of service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________ means concealing the contents of a message by enciphering.

Steganography

Cryptography

Compressing

Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers