TracnghiemTACN

TracnghiemTACN

University

52 Qs

quiz-placeholder

Similar activities

Seaport Operations and Management Quiz 3

Seaport Operations and Management Quiz 3

University

50 Qs

GE 5 PREFINAL EXAMINATION

GE 5 PREFINAL EXAMINATION

University

50 Qs

READING TEST DEC 2023

READING TEST DEC 2023

University

50 Qs

Midterm in TASMAC

Midterm in TASMAC

University

50 Qs

SSG104 FULL 100-150/210

SSG104 FULL 100-150/210

University

50 Qs

Software Engineering MCQ Test 2

Software Engineering MCQ Test 2

University

50 Qs

AKT test (151-200)   Жаңа вариант

AKT test (151-200) Жаңа вариант

University

50 Qs

TN 1_U1-10_Vocabulary

TN 1_U1-10_Vocabulary

University

50 Qs

TracnghiemTACN

TracnghiemTACN

Assessment

Quiz

English

University

Medium

Created by

Phạm Vũ

Used 8+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary threats to security were …………….

sabotage

physical theft of equipment

espionage against the products of the systems

All are correct

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

................ primary function, text processing, did not require the same

level of security as that of its predecessor.

ARPANET’s

ARPA’s

MULTICS’

UNIX’s

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Early computing approaches relied on ..........................

information security theory and cryptography.

security that was built into the physical environment of the data center that housed the computers.

the growing threat of cyber-attacks.

the level of security of every computer.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Network security was referred to as network insecurity............... the range

and frequency of computer security violations and the explosion in the

numbers of hosts and users on ARPANET.

Because of

However

Therefore

Although

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………. is a category of objects, persons, or other entities that presents a danger to an asset.

Threat

Security posture

Risk

Vulnerability

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………………… , is a multilayered system that protects the sovereignty of a state, its assets, its resources, and its people.

Personnel security

National security

Network security

Physical security

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Someone casually reading sensitive information not intended for his or her use is……….

intentional attack

a passive attack

direct attack

active attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?