Search Header Logo

Nguyên lí an toàn thông tin part3

Authored by anh bui

Instructional Technology

12th Grade

Used 2+ times

Nguyên lí an toàn thông tin part3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is transformed using cipher algorithms?

Scalar text

Complex text

Plain text

None

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CHAP stands for?

Challenger Hardware Authentication Protocols

Circuit Hardware Authentication Protocol

Challenger Handshake Authentication Protocols

Circuit Handshake Authentication Protocols

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the malware which does not replicate or clone through an infection?v

Trojans

Worms

Rootkits

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the features which violate cyber security.

Exploit

Attack

Compliance

None

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the legal form of hacking.

Cracking

Non- ethical hacking

Ethical hacking

Hacktivism

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware stands for?

Multipurpose software

Malfunctioned software

Malicious software

Malfunctioning of security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Indentify the least strong security encryption.

WPA2

WEP

WPA3

WPA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology