UTS Keamanan Sistem A

UTS Keamanan Sistem A

University

30 Qs

quiz-placeholder

Similar activities

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

Keamanan Jaringan dan Firewall

Keamanan Jaringan dan Firewall

University

25 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

Network Security 3

Network Security 3

University

32 Qs

Cybersecurity Essentials Chapter 8

Cybersecurity Essentials Chapter 8

10th Grade - University

25 Qs

Cybersecurity Essentials

Cybersecurity Essentials

10th Grade - University

25 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

25 Qs

UTS Keamanan Sistem A

UTS Keamanan Sistem A

Assessment

Quiz

Computers

University

Medium

Created by

Ikhwan Ruslianto

Used 18+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Assurance that the information is accessible only to those authorized to have access

Confidentiality

Integrity

Availability

Authenticity

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The trustworthiness of data or resources in terms of preventing improper or unauthorized changes

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Motive (Goal) + Method + Vulnerability =

Hacker

System hacking

Defence

Attack

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Motives behind information security attacks, except

Disrupting business continuity

Taking revenge

Demanding ransom

Doing home work

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Classification of Attacks, except

Passive Attacks

Active Attacks

Close-out Attacks

Insider Attacks

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Collects information about a target network to identify various ways to intrude into the system

Covering track

Penetration

Footprinting

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?