
New Skills quiz 1
Authored by Hari Devam
Computers
University
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______ means the protection of data from modification by unknown users.
Confidentiality
Integrity
Authentication
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ransomware?
Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money
Computer equipment that criminals steal from you and won't return until you pay them
Software used to protect your computer or mobile device from harmful viruses
A form of cryptocurrency
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CIA in Information Security stands for -
Confidentiality, Integration and Availability
Continuity, Integration and Availability
Continuity, Integrity and Accessibility
Confidentiality, Integrity and Availability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does 's' in https stand for?
safety
suspicious
secure
standard
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_________ is a code injecting method used for attacking the database of a system / website.
HTML injection
SQL Injection
Malicious code injection
XML Injection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
security officer
malicious hacker
security auditor
network analyst
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the existence of weakness in a system or network is known as?
Attack
Exploit
Vulnerability
Threat
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?