QUIZ FOR MY ADI

QUIZ FOR MY ADI

University

29 Qs

quiz-placeholder

Similar activities

HCI Quiz

HCI Quiz

University

25 Qs

B2B Business Strategies Quiz

B2B Business Strategies Quiz

University

25 Qs

Salon Management Quiz

Salon Management Quiz

12th Grade - University

33 Qs

SC1 Final Term Quiz No. 2

SC1 Final Term Quiz No. 2

University

30 Qs

OPMAN (Midterm exam)

OPMAN (Midterm exam)

University

24 Qs

2025  Medieval Europe and Japan Test

2025 Medieval Europe and Japan Test

6th Grade - University

24 Qs

KM Chap 5

KM Chap 5

University

30 Qs

CSA04 OS MCQ 1

CSA04 OS MCQ 1

University

29 Qs

QUIZ FOR MY ADI

QUIZ FOR MY ADI

Assessment

Quiz

others

University

Easy

Created by

Rose Quintana

Used 12+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is an example of identifying individual user profiles on social networking sites.

Data Encryption

Online

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How to avoid eavesdropping on network traffic while working on a computer on a public Wi-Fi access point?

Connect with a VPN service

Turn off your wifi

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is another term for confidential information of every individual?

Data Encryption

Privacy

Security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Characteristics that describes worm.hides

to create a strong and effective password.

discovering weaknesses of networks and systems to improve the security level of these systems

it travels to new computers without any intervention or knowledge of the user

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method can be used to ensure confidentiality of information?

Data Encryption

Privacy Method

Security Method

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

This attack disrupts services by overwhelming network devices with bogus traffic

Distributed Denial-Of-Service

Privacy Attack

Pishing Attack

Malware Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a component that belongs to the CIA triad?

Information

Security

Confidentiality

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?