CyberSaavy

CyberSaavy

University

5 Qs

quiz-placeholder

Similar activities

UNIT 2 revision

UNIT 2 revision

University

9 Qs

E-Commerce Review Quiz Chapter 5

E-Commerce Review Quiz Chapter 5

University

10 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

Digital Citizenship

Digital Citizenship

University

10 Qs

DFS40043 TOPIC 2

DFS40043 TOPIC 2

University

8 Qs

Bluetooth part 2

Bluetooth part 2

University

10 Qs

Quiz-Session13

Quiz-Session13

University

10 Qs

Everything You Need To Know About COVID

Everything You Need To Know About COVID

7th Grade - Professional Development

9 Qs

CyberSaavy

CyberSaavy

Assessment

Quiz

Other

University

Medium

Created by

psnacsewicysstudentchapter cse

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What are the three fundamental aspects that cybersecurity aims to ensure for information, often referred to as the CIA Triad?

Centralization, Isolation, Authorization

Confidentiality, Isolation, Authentication

   

  

Confidentiality, Integrity, Availability

 Cyberattacks, Intrusion Detection, Anonymity

2.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

How does encryption contribute to cybersecurity, and what does it specifically protect within the realm of information security?

Encryption safeguards physical access to computer systems.

Encryption protects data during transmission or storage, ensuring its confidentiality.

Encryption prevents cyberattacks by creating virtual barriers.

Encryption secures network protocols from unauthorized access.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does TCP stand for in the context of networking protocols, and what is its primary function?

Technical Control Protocol, managing network configurations

Textual Communication Protocol, facilitating text-based communication

Transferable Content Protocol, handling multimedia content transfer

Transmission Control Protocol, ensuring reliable data delivery

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following protocols is commonly used for the transfer of files between a client and a server over a network?

TCP/IP

UDP/IP

FTP

HTTP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of cyber forensics, what does the term "digital evidence" refer to, and why is it important in investigations?

Digital evidence refers to physical artifacts collected from crime scenes. It is crucial for recreating events.

Digital evidence includes any information stored electronically that can be used as proof in legal proceedings. It is vital for building a case.

 Digital evidence pertains only to text-based documents found on computers. It is essential for decoding encrypted messages.

Digital evidence is a term for forensic tools used in cyber investigations. It is essential for analyzing network traffic.