
UTS Keamanan Sistem A
Authored by Ikhwan Ruslianto
Computers
University
Used 19+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Assurance that the information is accessible only to those authorized to have access
Confidentiality
Integrity
Availability
Authenticity
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The trustworthiness of data or resources in terms of preventing improper or unauthorized changes
Confidentiality
Integrity
Availability
Authenticity
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users
Confidentiality
Integrity
Availability
Authenticity
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Motive (Goal) + Method + Vulnerability =
Hacker
System hacking
Defence
Attack
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Motives behind information security attacks, except
Disrupting business continuity
Taking revenge
Demanding ransom
Doing home work
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Classification of Attacks, except
Passive Attacks
Active Attacks
Close-out Attacks
Insider Attacks
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Collects information about a target network to identify various ways to intrude into the system
Covering track
Penetration
Footprinting
Scanning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?