Computer Security Quiz

Computer Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

AoL2 Module 1 Post-Test

AoL2 Module 1 Post-Test

University

15 Qs

C05-INDUSTRIAL AUTOMATION ENGINEERING SYSTEMS ASSEMBLY (1/2)

C05-INDUSTRIAL AUTOMATION ENGINEERING SYSTEMS ASSEMBLY (1/2)

University

15 Qs

ASK Tingkatan 1: 2.2.2 Format Imej pada Fail yang Sama

ASK Tingkatan 1: 2.2.2 Format Imej pada Fail yang Sama

12th Grade - University

12 Qs

PRUEBA DE SQL MASTERY

PRUEBA DE SQL MASTERY

University

10 Qs

[Quiz] C1 - Security Concepts & Models

[Quiz] C1 - Security Concepts & Models

University

10 Qs

Assessment of Learning

Assessment of Learning

University

15 Qs

Community

Community

University

15 Qs

QUIZ 1 (Chapter 1 & 2) OSHA

QUIZ 1 (Chapter 1 & 2) OSHA

University

10 Qs

Computer Security Quiz

Computer Security Quiz

Assessment

Quiz

Education

University

Medium

Created by

Johari johari

Used 14+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the 3 classification of protection in security basics?

i - Prevention

ii - Detection

iii - Reaction

iv - Action

i only

i and ii only

i. ii and iii only

All of the above

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the 3 security goals?
i - confidentiality

ii - availibility

iii - capability

iv - integrity

i only

ii only

i, ii and iv

All of the above

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which one is the security threats based on the following description.

-An unauthorized party not only gain access to but tampers with an assets

Interruption

Interception

Modification

Fabrication

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the List is Security Principle/s :

i - Confidentiality

ii - Speed of action

iii - Size of action

iv - Toughness of action

i only

ii only

i, ii and iii only

All of the above

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Pyramid DIKW of data classification stands for?

Data

Information

Knowledge

Wisdom

Data

Interception

Knowledge

Wisdom

DNA

Information

Knowledge

Wisdom

Data

Information

Knowledge

Wes Anderson

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is security planning?

USES MAINTAIN THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF INFORMATION SYSTEM.

the process of separating and organizing data into relevant groups (“classes”).

a set of discrete, objective facts or observations, which are unorganised und unprocessed and therefore have no meaning or value

organised or structured data, which has been processed in such a way that the information now has relevance for a specific purpose and meaningful.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the cyber security standards?

i - ISO 27001

ii - PCI DSS

iii - HEPA

iv - FINAS

i only

i and ii only

i, ii and iii only

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?