Happy Hour - JMS1

Happy Hour - JMS1

KG

10 Qs

quiz-placeholder

Similar activities

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cybersecurity Knowledge Quiz

Cybersecurity Knowledge Quiz

Professional Development

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Secure SDLC @ BiS

Secure SDLC @ BiS

University

13 Qs

[Quiz] C1 - Security Concepts & Models

[Quiz] C1 - Security Concepts & Models

University

10 Qs

Nodejs: Express Authorization and Authentication

Nodejs: Express Authorization and Authentication

Professional Development

10 Qs

Secuuruhty

Secuuruhty

Professional Development

10 Qs

Week 10 - Module 5 Unit 1 Security Concern

Week 10 - Module 5 Unit 1 Security Concern

University

13 Qs

Happy Hour - JMS1

Happy Hour - JMS1

Assessment

Quiz

Professional Development

KG

Medium

Created by

Miguel Silva

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

MiTM attack

Phishing attack

Website attack

DoS attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the existence of weakness in a system or network is known as?

Attack

Exploit

Vulnerability

Threat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct sequence for identification an authorization.

Identification>Authentication>Authorization

Identification>Authorization>Authentication

Authorization>Authentication>Identification

Authorization>Identification>Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does AES stands for?

Advanced Encryption Security

Advanced Encryption Standard

Advanced Encrypted Standard

Active Encryption Standard

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a non-technical type of intrusion or attack technique?

Reverse Engineering

Malware Analysis

Social Engineering

Malware Writing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

Integrity

Authenticity

Availability

Confidentiality

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When integrity is lacking in a security system, wich of the following occurs.

Data tampering

Data deletion

Data leakage

Database hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?