PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

University

50 Qs

quiz-placeholder

Similar activities

MTA 98-364 RESUME

MTA 98-364 RESUME

University - Professional Development

50 Qs

Domain 1 - Network Security

Domain 1 - Network Security

9th Grade - University

46 Qs

adhoc and wireless sensor network- iat3

adhoc and wireless sensor network- iat3

University

50 Qs

Ethical Hacking Quiz

Ethical Hacking Quiz

University

50 Qs

Midterm Quiz 1 - Computer Studies

Midterm Quiz 1 - Computer Studies

University

49 Qs

CNS-Technical Quiz

CNS-Technical Quiz

University

50 Qs

ICT 101-150 QUESTIONS

ICT 101-150 QUESTIONS

University

50 Qs

Know Your Keyboard 20 sec

Know Your Keyboard 20 sec

6th Grade - University

46 Qs

 PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 7+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is frequently used to describe the tasks of securing information that is in a digital format?

network security

information security

data security

security guard

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It ensures that data is accessible to authorized users.

Confidentiality

Integrity

Availability

Authentication

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It ensures that the information is correct and no unauthorized person or malicious software has altered the data.

Confidentiality

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

script kiddies

identity theft

cyber terrorism.

malicious program

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Locks up files until the user pays a “ransom” to have them released

script kiddies

identity theft

cyber terrorism.

malicious program

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Type of of defense against attack which approach has the advantage of creating a barrier of multiple defenses that can be coordinated to thwart a variety of attacks.

Limiting

Layering

Diversity

Obscurity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is another server-side web application attack that manipulates user responses?

XML Injection

Cross-Site Scripting

SQL Injection

Directory Traversal

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?