Search Header Logo

sessional 2 CS qUIZ

Authored by Priyanka Gulati

Computers

University

Used 33+ times

sessional 2   CS qUIZ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Physical Seurity

Network Security

Information Security

Database Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which one of the following type security

Network Security

Cloud Security

Application Security

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

which one of the following is defined as an attempt to steal,spy, damage or destroy computer system, network or their associated information

cryptography

Digital Hacking

cyber attack

computer security

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Identify the oldest phone hacking technique used by hackers to make free calls.

Spamming

Phising

Cracking

Phreaking

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Identify the type of attack which uses a fraudulent server with a relay address

MITN

NTLM

SMB

NET BIOS

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

_________________ is the kind of firewall is connected between the device and the network connecting

hardware Firewall

Software Firewall

Stateful Inspetion Firewall

Microsoft Firewall

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Firewall examines each ____________ that are entering or leaving the internal network.

a) emails users

update

Connection

data packet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?