New Skills quiz 1

New Skills quiz 1

University

15 Qs

quiz-placeholder

Similar activities

Security+ SY0-701

Security+ SY0-701

University

15 Qs

CIW IBA Lesson 9 Vocabulary

CIW IBA Lesson 9 Vocabulary

8th Grade - Professional Development

14 Qs

Tipos de VPN

Tipos de VPN

University

10 Qs

Cloud Computing 09

Cloud Computing 09

University

20 Qs

VLAN

VLAN

University

20 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Fellowship program 2021

Fellowship program 2021

University - Professional Development

15 Qs

Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

New Skills quiz 1

New Skills quiz 1

Assessment

Quiz

Computers

University

Medium

Created by

Hari Devam

Used 9+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ means the protection of data from modification by unknown users.

Confidentiality

Integrity

Authentication

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money

Computer equipment that criminals steal from you and won't return until you pay them

Software used to protect your computer or mobile device from harmful viruses

A form of cryptocurrency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA in Information Security stands for -

Confidentiality, Integration and Availability

Continuity, Integration and Availability

Continuity, Integrity and Accessibility

Confidentiality, Integrity and Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 's' in https stand for?

safety

suspicious

secure

standard

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ is a code injecting method used for attacking the database of a system / website.

HTML injection

SQL Injection

Malicious code injection

XML Injection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

security officer

malicious hacker

security auditor

network analyst

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the existence of weakness in a system or network is known as?

Attack

Exploit

Vulnerability

Threat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?