S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

quiz-placeholder

Similar activities

IT Essentials Ch 6 Review - Applied Networking

IT Essentials Ch 6 Review - Applied Networking

9th Grade - University

20 Qs

Administrasi Dan Pengelolaan Jaringan Komputer

Administrasi Dan Pengelolaan Jaringan Komputer

University

20 Qs

Cybersecurity Fundamentals Semester Exam

Cybersecurity Fundamentals Semester Exam

12th Grade - University

20 Qs

Soal AIJ bulan Agustus 2019 kls xii

Soal AIJ bulan Agustus 2019 kls xii

University

20 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

UH 1 AIJ XII

UH 1 AIJ XII

1st Grade - University

20 Qs

Module 8-Network Layer

Module 8-Network Layer

9th Grade - University

12 Qs

EC8551-CN- activity 1

EC8551-CN- activity 1

University

10 Qs

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

Assessment

Quiz

Computers

University

Hard

Created by

Drajad Wiryawan

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

Look at the left picture, what is the type of control

Deterrent Control

Detective Control

Preventive Control

Correction Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the left picture, what is the control name ?

Detective Control

Preventive Control

Correction Control

Deterrent Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the long name of RAID

Redundancy Arrays of Inexpensive Diskette

Redundancy Arrays of Inexpensive Disks

Redundant Arrays of Inexpensive Diskette

Redundant Arrays of Inexpensive Disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concern of protecting data in physical security

Securing Access

Safety

Accessibility

All Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the Left Picture, what is the type fo social engineering attack

Follower

Pretexting

Following

Tailgating

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Look at the picture, what is the type of social engineering attack?

Spying

Phishing

Fishing

Catching

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a mechanism for maintaining control over the traffic that flows in and out of networks

Proxy

Router

Firewall

Modem

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?