ROUND 3

ROUND 3

University

10 Qs

quiz-placeholder

Similar activities

IAS_F_SW1

IAS_F_SW1

University

10 Qs

SAFETY MANAGEMENT SYSTEM

SAFETY MANAGEMENT SYSTEM

University

10 Qs

Introduction to System Administration

Introduction to System Administration

University

15 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

University

10 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

Security Principles Quiz

Security Principles Quiz

University

15 Qs

WORKPLACE SECURITY

WORKPLACE SECURITY

University

10 Qs

ROUND 3

ROUND 3

Assessment

Quiz

Other

University

Hard

Created by

Janarthanan Janarthanan

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall is a

wall built to prevent fires from damaging a corporate intranet

security device deployed at the boundary of a company to prevent unauthorized physical access

security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

device to prevent all accesses from the internet to the corporate intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By security in e-Commerce we mean

(i) Protecting an organization’s data resource from unauthorized access

(ii)Preventing disasters from happening

(iii) Authenticating messages received by an organization

(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

i, ii

ii, iii

iii, iv

i, iii, iv

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hashing function for digital signature

(i) must give a hashed message which is shorter than the original message

(ii)must be hardware implementable

(iii) two different messages should not give the same hashed message

(iv) is not essential for implementing digital signature

i and ii

ii and iii

i and iii

iii and iv

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can cookies be used to mitigate cross-site scripting?

Cookies can be coded like a program to intercept script attacks.

Cookies store an exact mirror copy of all a users web activity.

Cookies allow for cookie-based user authentication.

They can't. Cookies only store user information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security, functionality, and ease of use triangle illustrates which concept?

As security increases, functionality and ease of use increase.

As security decreases, functionality and ease of use increase.

As security decreases, functionality and ease of use decrease.

Security does not affect functionality and ease of use

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the difference between the given 2 C codes?

No difference as space doesn’t make any difference, values of a, b, d are same in both the case

Space does make a difference, values of a, b, d are different

Program 1 has syntax error, program 2 is not

Program 2 has syntax error, program 1 is not

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How many times i value is checked in the given C program?


1

2

3

4

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?