PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

University

50 Qs

quiz-placeholder

Similar activities

IT INFRA-MIDTERM EXAM

IT INFRA-MIDTERM EXAM

University

50 Qs

2nd C Programming Quiz

2nd C Programming Quiz

University

50 Qs

Microsoft Excels: Formulas and Functions

Microsoft Excels: Formulas and Functions

12th Grade - University

45 Qs

OBJECT ORIENTED ANALYSIS AND DESIGN

OBJECT ORIENTED ANALYSIS AND DESIGN

University

46 Qs

prelim_integ

prelim_integ

University

50 Qs

OS Quiz 2 LH18

OS Quiz 2 LH18

University

45 Qs

PKB - 6

PKB - 6

University

55 Qs

Davinci Resolve 17 Fusion 101

Davinci Resolve 17 Fusion 101

11th Grade - Professional Development

45 Qs

 PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

PERCIVAL ADAO

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is frequently used to describe the tasks of securing information that is in a digital format?

network security

information security

data security

security guard

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It ensures that data is accessible to authorized users.

Confidentiality

Integrity

Availability

Authentication

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It ensures that the information is correct and no unauthorized person or malicious software has altered the data.

Confidentiality

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

script kiddies

identity theft

cyber terrorism.

malicious program

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Locks up files until the user pays a “ransom” to have them released

script kiddies

identity theft

cyber terrorism.

malicious program

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Type of of defense against attack which approach has the advantage of creating a barrier of multiple defenses that can be coordinated to thwart a variety of attacks.

Limiting

Layering

Diversity

Obscurity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is another server-side web application attack that manipulates user responses?

XML Injection

Cross-Site Scripting

SQL Injection

Directory Traversal

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?