UTS Keamanan Sistem A

UTS Keamanan Sistem A

University

30 Qs

quiz-placeholder

Similar activities

Tech Quiz Round-1 (College)

Tech Quiz Round-1 (College)

University

30 Qs

CIS27B Quiz 2 Review

CIS27B Quiz 2 Review

University

25 Qs

Chapter 1 Intro to Cybersecurity Cisco

Chapter 1 Intro to Cybersecurity Cisco

10th Grade - University

25 Qs

Cybersecurity Essentials

Cybersecurity Essentials

10th Grade - University

25 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

Cybersecurity Fundamentals Practice Quiz

Cybersecurity Fundamentals Practice Quiz

University

25 Qs

IT301 Final Ex 2022

IT301 Final Ex 2022

University

25 Qs

CISSP Ch. 4

CISSP Ch. 4

University

35 Qs

UTS Keamanan Sistem A

UTS Keamanan Sistem A

Assessment

Quiz

Computers

University

Medium

Created by

Ikhwan Ruslianto

Used 18+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Assurance that the information is accessible only to those authorized to have access

Confidentiality

Integrity

Availability

Authenticity

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The trustworthiness of data or resources in terms of preventing improper or unauthorized changes

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Motive (Goal) + Method + Vulnerability =

Hacker

System hacking

Defence

Attack

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Motives behind information security attacks, except

Disrupting business continuity

Taking revenge

Demanding ransom

Doing home work

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Classification of Attacks, except

Passive Attacks

Active Attacks

Close-out Attacks

Insider Attacks

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Collects information about a target network to identify various ways to intrude into the system

Covering track

Penetration

Footprinting

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?