ROUND 3

ROUND 3

University

10 Qs

quiz-placeholder

Similar activities

Post Test ORM DAY 2

Post Test ORM DAY 2

University

10 Qs

FRESH 2020

FRESH 2020

University

10 Qs

Pengajian Am Sem 1 Pelembagaan

Pengajian Am Sem 1 Pelembagaan

University

10 Qs

POST TEST MATERI 1 (PROFILE) PKKMB PRODI S1 TATA RIAS

POST TEST MATERI 1 (PROFILE) PKKMB PRODI S1 TATA RIAS

University

15 Qs

Pengajian Am Kenegaraan Sem 1

Pengajian Am Kenegaraan Sem 1

University

10 Qs

Parcial 2 - Epidemiología Oral, Promoción y Prevención - 2022-2

Parcial 2 - Epidemiología Oral, Promoción y Prevención - 2022-2

University

10 Qs

DCIT Week 1 Quiz

DCIT Week 1 Quiz

University

10 Qs

OPEN HOUSE BEM KEMA POLBAN

OPEN HOUSE BEM KEMA POLBAN

University

13 Qs

ROUND 3

ROUND 3

Assessment

Quiz

Other

University

Practice Problem

Hard

Created by

Janarthanan Janarthanan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall is a

wall built to prevent fires from damaging a corporate intranet

security device deployed at the boundary of a company to prevent unauthorized physical access

security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

device to prevent all accesses from the internet to the corporate intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By security in e-Commerce we mean

(i) Protecting an organization’s data resource from unauthorized access

(ii)Preventing disasters from happening

(iii) Authenticating messages received by an organization

(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

i, ii

ii, iii

iii, iv

i, iii, iv

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hashing function for digital signature

(i) must give a hashed message which is shorter than the original message

(ii)must be hardware implementable

(iii) two different messages should not give the same hashed message

(iv) is not essential for implementing digital signature

i and ii

ii and iii

i and iii

iii and iv

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can cookies be used to mitigate cross-site scripting?

Cookies can be coded like a program to intercept script attacks.

Cookies store an exact mirror copy of all a users web activity.

Cookies allow for cookie-based user authentication.

They can't. Cookies only store user information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security, functionality, and ease of use triangle illustrates which concept?

As security increases, functionality and ease of use increase.

As security decreases, functionality and ease of use increase.

As security decreases, functionality and ease of use decrease.

Security does not affect functionality and ease of use

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the difference between the given 2 C codes?

No difference as space doesn’t make any difference, values of a, b, d are same in both the case

Space does make a difference, values of a, b, d are different

Program 1 has syntax error, program 2 is not

Program 2 has syntax error, program 1 is not

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How many times i value is checked in the given C program?


1

2

3

4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?