SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

Security+ Study Guide-01 Mastering Security Basics

Security+ Study Guide-01 Mastering Security Basics

Professional Development

15 Qs

Security Trends

Security Trends

Professional Development

7 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Encryption

Encryption

Professional Development

15 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

Computer Networks Quiz

Computer Networks Quiz

University - Professional Development

10 Qs

CyberSecurity

CyberSecurity

Professional Development

13 Qs

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Izuan Ninggal

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which of the following are computing assets?

Cloud

WiFi

Network Router

Stapler

USB flash Drive

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

"Change existing values in a database unauthorizedly". This threat refers to

Interruption

Interception

Modification

Fabrication

3.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

When we say security protection, we want to achieve these goals:

Confidence

Integrity

Availability

Durability

Confidentiality

4.

FILL IN THE BLANK QUESTION

1 min • 10 pts

"Ensuring that data and services are accessible when needed."

This statement refers to which security goal (CIA Triad)?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following statements refer to integrity:

Guaranteeing the correctness of data

Maintaining privacy

Preventing unauthorized access

Maintaining system uptime

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

The attacker unauthorizedly obtain information without changing the system resource. This attack refers to:

Active attack

Passive attack

Insider attack

Outsider attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

This cryptography uses two keys, one for encryption and another key for decryption.

Symmetric encryption

Metric encryption

Public-key encryption

Private-key Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?