PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

University

50 Qs

quiz-placeholder

Similar activities

Cybersecurity Intro

Cybersecurity Intro

University

45 Qs

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

Quiz Latihan Soal-Soal UTS Keamanan Jaringan

Quiz Latihan Soal-Soal UTS Keamanan Jaringan

KG - University

50 Qs

Cybersecurity Quiz

Cybersecurity Quiz

11th Grade - University

47 Qs

CS8391 - DS - IAT2

CS8391 - DS - IAT2

University

50 Qs

CS8391 - DS-IAT#3

CS8391 - DS-IAT#3

University

50 Qs

kuis  Jaringan Internet

kuis Jaringan Internet

9th Grade - University

50 Qs

Information Security model exam

Information Security model exam

University

50 Qs

 PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 7+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is frequently used to describe the tasks of securing information that is in a digital format?

network security

information security

data security

security guard

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It ensures that data is accessible to authorized users.

Confidentiality

Integrity

Availability

Authentication

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It ensures that the information is correct and no unauthorized person or malicious software has altered the data.

Confidentiality

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

script kiddies

identity theft

cyber terrorism.

malicious program

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Locks up files until the user pays a “ransom” to have them released

script kiddies

identity theft

cyber terrorism.

malicious program

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Type of of defense against attack which approach has the advantage of creating a barrier of multiple defenses that can be coordinated to thwart a variety of attacks.

Limiting

Layering

Diversity

Obscurity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is another server-side web application attack that manipulates user responses?

XML Injection

Cross-Site Scripting

SQL Injection

Directory Traversal

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?