
Nguyên lí an toàn thông tin
Authored by anh bui
Instructional Technology
11th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the term denotes that only authorized users are capable of accessing the information ?
Confidentiality
Availabilyty
Integrity
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
State whether True or False: Data encryption is primarily used to ensure confidentiality?
True
False
Cannot be interpreted
None
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the Debian - based OS which has 2 virtual machines and focuses on preserving user's data?
Ubuntu
Fedora
Whonix
Kubuntu
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the oldest phone hacking technique used by hackers to make free calls.
Spamming
Phreaking
Cracking
Phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which of the following platforms is used for the safety and protection of information in the cloud?
AWS
Cloud workload protection platforms
Cloud security protocols
One Drive
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the type of attack which uses a fraudulent server with a relau address.
MITM
NTLM
SMB
NetBIOS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the port used to connect to Active Directory in Windows 2000.
139
445
80
389
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?