INFORMATION, ASSURANCE & SECURITY

INFORMATION, ASSURANCE & SECURITY

University

15 Qs

quiz-placeholder

Similar activities

Evaluasi Pertemuan 12 DRPL TI-3B

Evaluasi Pertemuan 12 DRPL TI-3B

University

15 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

Quiz Rolling Vol.8

Quiz Rolling Vol.8

10th Grade - University

10 Qs

POP QUIZ 4 (DFC40243)

POP QUIZ 4 (DFC40243)

University

10 Qs

21CSC305P - Machnine Learning - Quiz

21CSC305P - Machnine Learning - Quiz

University

15 Qs

MIDTERM EXAM - IT APP

MIDTERM EXAM - IT APP

University

17 Qs

Webinar Quiz

Webinar Quiz

University

13 Qs

CCI Summit Net.Conf Webinar Quiz

CCI Summit Net.Conf Webinar Quiz

University

15 Qs

INFORMATION, ASSURANCE & SECURITY

INFORMATION, ASSURANCE & SECURITY

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Jamelica Bautista

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Attackers send deceptive emails or messages to trick recipients into revealing sensitive information, clicking on malicious links, or downloading malicious attachments.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting (XSS)

Phishing

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Injecting malicious scripts into web pages viewed by other users, allowing attackers to steal information or perform actions on behalf of the victim.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting (XSS)

Phishing

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Intercepting communication between two parties to eavesdrop, modify, or inject malicious content into the conversation.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting

Phishing

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Can detect possible areas of data leakage or illegal access and assist in determining how data flows across a system.

Data Flow Diagram

DREAD Model

Attack Trees

STRIDE Model

5.

FILL IN THE BLANK QUESTION

1 min • 2 pts

S in STRIDE Models stands for what word?

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

E in STRIDE Models stands for what word?

7.

FILL IN THE BLANK QUESTION

1 min • 2 pts

It is the visual representations of potential attack scenarios, with the root node representing the main goal of an attacker

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?