INFORMATION, ASSURANCE & SECURITY

INFORMATION, ASSURANCE & SECURITY

University

15 Qs

quiz-placeholder

Similar activities

Quiz 1 CCE

Quiz 1 CCE

University

15 Qs

ADB Quiz #1

ADB Quiz #1

University

15 Qs

Input/Output

Input/Output

University

20 Qs

unit2 Big Data  ปวส. 1

unit2 Big Data ปวส. 1

University

10 Qs

AB1401 Case Study: Facebook

AB1401 Case Study: Facebook

University

12 Qs

UTILITY PROGRAM

UTILITY PROGRAM

University

10 Qs

GIS Unit III

GIS Unit III

University

15 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

INFORMATION, ASSURANCE & SECURITY

INFORMATION, ASSURANCE & SECURITY

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Jamelica Bautista

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Attackers send deceptive emails or messages to trick recipients into revealing sensitive information, clicking on malicious links, or downloading malicious attachments.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting (XSS)

Phishing

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Injecting malicious scripts into web pages viewed by other users, allowing attackers to steal information or perform actions on behalf of the victim.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting (XSS)

Phishing

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Intercepting communication between two parties to eavesdrop, modify, or inject malicious content into the conversation.

Man-in-the-Middle (MitM) Attacks

SQL Injection

Cross-Site Scripting

Phishing

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Can detect possible areas of data leakage or illegal access and assist in determining how data flows across a system.

Data Flow Diagram

DREAD Model

Attack Trees

STRIDE Model

5.

FILL IN THE BLANK QUESTION

1 min • 2 pts

S in STRIDE Models stands for what word?

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

E in STRIDE Models stands for what word?

7.

FILL IN THE BLANK QUESTION

1 min • 2 pts

It is the visual representations of potential attack scenarios, with the root node representing the main goal of an attacker

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?