TracnghiemTACN

TracnghiemTACN

University

52 Qs

quiz-placeholder

Similar activities

UNIT 11 - PHONETIC

UNIT 11 - PHONETIC

6th Grade - University

50 Qs

【Part 3】 优品教培中心 F3 Test Your Vocab

【Part 3】 优品教培中心 F3 Test Your Vocab

KG - Professional Development

50 Qs

Anh 7- Ôn thi giữa HK2

Anh 7- Ôn thi giữa HK2

7th Grade - University

47 Qs

UTS MK Bahasa Inggris 2 TRK

UTS MK Bahasa Inggris 2 TRK

University

50 Qs

Vocabulary review

Vocabulary review

1st Grade - University

56 Qs

LATSOL SAS GANJIL PKN 8

LATSOL SAS GANJIL PKN 8

2nd Grade - University

50 Qs

Midterm Test Preparation

Midterm Test Preparation

8th Grade - University

50 Qs

Revision for Unit 4 - E11

Revision for Unit 4 - E11

11th Grade - University

50 Qs

TracnghiemTACN

TracnghiemTACN

Assessment

Quiz

English

University

Practice Problem

Medium

Created by

Phạm Vũ

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary threats to security were …………….

sabotage

physical theft of equipment

espionage against the products of the systems

All are correct

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

................ primary function, text processing, did not require the same

level of security as that of its predecessor.

ARPANET’s

ARPA’s

MULTICS’

UNIX’s

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Early computing approaches relied on ..........................

information security theory and cryptography.

security that was built into the physical environment of the data center that housed the computers.

the growing threat of cyber-attacks.

the level of security of every computer.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Network security was referred to as network insecurity............... the range

and frequency of computer security violations and the explosion in the

numbers of hosts and users on ARPANET.

Because of

However

Therefore

Although

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………. is a category of objects, persons, or other entities that presents a danger to an asset.

Threat

Security posture

Risk

Vulnerability

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

……………………… , is a multilayered system that protects the sovereignty of a state, its assets, its resources, and its people.

Personnel security

National security

Network security

Physical security

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Someone casually reading sensitive information not intended for his or her use is……….

intentional attack

a passive attack

direct attack

active attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for English