S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

quiz-placeholder

Similar activities

Quiz OSK 14

Quiz OSK 14

University

10 Qs

CSC 306 Module 1 Assessment

CSC 306 Module 1 Assessment

University

11 Qs

Industry 4.0 Unit 1

Industry 4.0 Unit 1

University

10 Qs

Bloque 3: Programación de dispositivos

Bloque 3: Programación de dispositivos

University

20 Qs

DCN5511: Chapter 5 - 7

DCN5511: Chapter 5 - 7

University

15 Qs

Control Structures  C#

Control Structures C#

University

20 Qs

YAY! Fridate with ComSSA (Network 101)

YAY! Fridate with ComSSA (Network 101)

University

20 Qs

Process modeling

Process modeling

University

10 Qs

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Drajad Wiryawan

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the left picture, what is the type of control

Deterrent Control

Detective Control

Preventive Control

Correction Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the left picture, what is the control name ?

Detective Control

Preventive Control

Correction Control

Deterrent Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the long name of RAID

Redundancy Arrays of Inexpensive Diskette

Redundancy Arrays of Inexpensive Disks

Redundant Arrays of Inexpensive Diskette

Redundant Arrays of Inexpensive Disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concern of protecting data in physical security

Securing Access

Safety

Accessibility

All Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the Left Picture, what is the type fo social engineering attack

Follower

Pretexting

Following

Tailgating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the picture, what is the type of social engineering attack?

Spying

Phishing

Fishing

Catching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a mechanism for maintaining control over the traffic that flows in and out of networks

Proxy

Router

Firewall

Modem

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?