SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

SMTP

SMTP

Professional Development

10 Qs

How are you doing?

How are you doing?

Professional Development

10 Qs

Bedrock Quiz 1 - NAMER - GenAI - Enablement

Bedrock Quiz 1 - NAMER - GenAI - Enablement

Professional Development

10 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

CEH Study Guide - 13 Cryptography

CEH Study Guide - 13 Cryptography

Professional Development

15 Qs

Implementing Cloud Security

Implementing Cloud Security

Professional Development

10 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

Web application security

Web application security

Professional Development

10 Qs

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Izuan Ninggal

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which of the following are computing assets?

Cloud

WiFi

Network Router

Stapler

USB flash Drive

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

"Change existing values in a database unauthorizedly". This threat refers to

Interruption

Interception

Modification

Fabrication

3.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

When we say security protection, we want to achieve these goals:

Confidence

Integrity

Availability

Durability

Confidentiality

4.

FILL IN THE BLANK QUESTION

1 min • 10 pts

"Ensuring that data and services are accessible when needed."

This statement refers to which security goal (CIA Triad)?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following statements refer to integrity:

Guaranteeing the correctness of data

Maintaining privacy

Preventing unauthorized access

Maintaining system uptime

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

The attacker unauthorizedly obtain information without changing the system resource. This attack refers to:

Active attack

Passive attack

Insider attack

Outsider attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

This cryptography uses two keys, one for encryption and another key for decryption.

Symmetric encryption

Metric encryption

Public-key encryption

Private-key Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?