
S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023
Authored by Drajad Wiryawan
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Look at the left picture, what is the type of control
Deterrent Control
Detective Control
Preventive Control
Correction Control
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Look at the left picture, what is the control name ?
Detective Control
Preventive Control
Correction Control
Deterrent Control
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the long name of RAID
Redundancy Arrays of Inexpensive Diskette
Redundancy Arrays of Inexpensive Disks
Redundant Arrays of Inexpensive Diskette
Redundant Arrays of Inexpensive Disks
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the concern of protecting data in physical security
Securing Access
Safety
Accessibility
All Wrong
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Look at the Left Picture, what is the type fo social engineering attack
Follower
Pretexting
Following
Tailgating
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Look at the picture, what is the type of social engineering attack?
Spying
Phishing
Fishing
Catching
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a mechanism for maintaining control over the traffic that flows in and out of networks
Proxy
Router
Firewall
Modem
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?