S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

quiz-placeholder

Similar activities

Administrasi Infrastruktur Jaringan XI (VLAN)

Administrasi Infrastruktur Jaringan XI (VLAN)

University

20 Qs

CSE205-DCN-QUIZ-UNIT-5

CSE205-DCN-QUIZ-UNIT-5

University

10 Qs

Routing Concepts 1

Routing Concepts 1

University

11 Qs

Q3 Transport Layer

Q3 Transport Layer

University

20 Qs

Snort Usage Quiz

Snort Usage Quiz

University

11 Qs

CN UNIT 4

CN UNIT 4

University

18 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

Network Security

Network Security

University

20 Qs

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

Assessment

Quiz

Computers

University

Hard

Created by

Drajad Wiryawan

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the left picture, what is the type of control

Deterrent Control

Detective Control

Preventive Control

Correction Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the left picture, what is the control name ?

Detective Control

Preventive Control

Correction Control

Deterrent Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the long name of RAID

Redundancy Arrays of Inexpensive Diskette

Redundancy Arrays of Inexpensive Disks

Redundant Arrays of Inexpensive Diskette

Redundant Arrays of Inexpensive Disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concern of protecting data in physical security

Securing Access

Safety

Accessibility

All Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the Left Picture, what is the type fo social engineering attack

Follower

Pretexting

Following

Tailgating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the picture, what is the type of social engineering attack?

Spying

Phishing

Fishing

Catching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a mechanism for maintaining control over the traffic that flows in and out of networks

Proxy

Router

Firewall

Modem

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?