IS Quiz-1

IS Quiz-1

University

20 Qs

quiz-placeholder

Similar activities

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

Rob 2 Sem. 1 Study Guide

Rob 2 Sem. 1 Study Guide

9th Grade - University

21 Qs

Yr 12 - Data, knowledge & information.

Yr 12 - Data, knowledge & information.

12th Grade - University

20 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

Chapter 11 - Switch Security Configuration

Chapter 11 - Switch Security Configuration

University

15 Qs

Wireless Security

Wireless Security

University

20 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

IS Quiz-1

IS Quiz-1

Assessment

Quiz

Computers

University

Medium

Created by

aakanksha 1

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The below logic is an example of what kind of cyber-attack targets the vulnerabilities on the Databases?

‘ OR ‘1’=’1′ — ‘ OR ‘1’=’1′ { ‘ OR ‘1’=’1′ /*

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the X mentioning here?

Email X           – where an attacker forges the sending address of an email.

IP address X   – where an attacker alters the source IP address in a network packet to hide their identity.

Biometric X     -where an attacker produces a fake biometric sample to pose as another user

MAC X             – where an attacker modifies the Media Access Control (MAC) address of their network interface to pose as a valid user on a network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which will not harm computer resources?

firewall

Virus

Trojan horse

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojan-Horse programs

are legitimate programs that allow unauthorized access

are hacker programs that do not show up on the system

really do not usually work

are usually immediately discovered

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer checks the _____ of user names and passwords for a match before granting access.

Website

Network

Backup file

Data base

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All of the following are examples of real security and privacy risks. EXCEPT

Hackers

Spam

Viruses

Identity Theft

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__ is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.

Hacking

Spoofing

Eavesdropping

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?