
Nguyên lí an toàn thông tin part3
Authored by anh bui
Instructional Technology
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is transformed using cipher algorithms?
Scalar text
Complex text
Plain text
None
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CHAP stands for?
Challenger Hardware Authentication Protocols
Circuit Hardware Authentication Protocol
Challenger Handshake Authentication Protocols
Circuit Handshake Authentication Protocols
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the malware which does not replicate or clone through an infection?v
Trojans
Worms
Rootkits
Virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the features which violate cyber security.
Exploit
Attack
Compliance
None
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the legal form of hacking.
Cracking
Non- ethical hacking
Ethical hacking
Hacktivism
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware stands for?
Multipurpose software
Malfunctioned software
Malicious software
Malfunctioning of security
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Indentify the least strong security encryption.
WPA2
WEP
WPA3
WPA
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?