TracnghiemTACN

TracnghiemTACN

University

52 Qs

quiz-placeholder

Similar activities

Test English Tân

Test English Tân

University

52 Qs

W04 - WMA

W04 - WMA

University

50 Qs

Midterm Exam in IT Elective 3

Midterm Exam in IT Elective 3

University

50 Qs

AKT test (451-500)   Ескі вариант

AKT test (451-500) Ескі вариант

University

55 Qs

Revision Cyber Security

Revision Cyber Security

University

47 Qs

Grupa A- 50 pojęć informatycznych

Grupa A- 50 pojęć informatycznych

KG - Professional Development

50 Qs

111-2 Thematic Vocabulary (Night) Final Exam

111-2 Thematic Vocabulary (Night) Final Exam

University

50 Qs

Software Engineering MCQ Test 3

Software Engineering MCQ Test 3

University

50 Qs

TracnghiemTACN

TracnghiemTACN

Assessment

Quiz

English

University

Medium

Created by

Phạm Vũ

Used 8+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary threats to security were …………….

sabotage

physical theft of equipment

espionage against the products of the systems

All are correct

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

................ primary function, text processing, did not require the same

level of security as that of its predecessor.

ARPANET’s

ARPA’s

MULTICS’

UNIX’s

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Early computing approaches relied on ..........................

information security theory and cryptography.

security that was built into the physical environment of the data center that housed the computers.

the growing threat of cyber-attacks.

the level of security of every computer.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Network security was referred to as network insecurity............... the range

and frequency of computer security violations and the explosion in the

numbers of hosts and users on ARPANET.

Because of

However

Therefore

Although

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………. is a category of objects, persons, or other entities that presents a danger to an asset.

Threat

Security posture

Risk

Vulnerability

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………………… , is a multilayered system that protects the sovereignty of a state, its assets, its resources, and its people.

Personnel security

National security

Network security

Physical security

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Someone casually reading sensitive information not intended for his or her use is……….

intentional attack

a passive attack

direct attack

active attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?