NETSEC MIDTERM EXAM PART 1

NETSEC MIDTERM EXAM PART 1

University

15 Qs

quiz-placeholder

Similar activities

Internet Cookies

Internet Cookies

University

13 Qs

Assessment # 1-  Information Assurance and Security 1

Assessment # 1- Information Assurance and Security 1

University

15 Qs

IT01 CHAPTER 1

IT01 CHAPTER 1

University

20 Qs

Lesson7

Lesson7

University - Professional Development

12 Qs

Data analytics basics

Data analytics basics

University

10 Qs

BSCS 4-2 - CS Elective 4 (Data Mining)

BSCS 4-2 - CS Elective 4 (Data Mining)

University

20 Qs

Computer Basics and Programming Quiz 2

Computer Basics and Programming Quiz 2

12th Grade - University

15 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

NETSEC MIDTERM EXAM PART 1

NETSEC MIDTERM EXAM PART 1

Assessment

Quiz

Instructional Technology

University

Hard

Created by

JONARD LOPEZ

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary responsibility of management in ensuring information security?

Supervising infrastructure deployment

Delegating security tasks to IT

Implementing security measures effectively

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common IP violation?

Software piracy

Intellectual property protection

Technical protection measures enforcement

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a brute force password attack?

Selecting specific accounts for attack

Trying every possible combination of a password

Using widely known passwords for guessing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary role of the Chief Information Security Officer (CISO)?

Advising on strategic information management

Enforcing information security policies

Reviewing technical aspects of security projects

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach to information security implementation involves a systematic plan like Systems Development Life Cycle (SDLC)?

Top-down Approach

Bottom-up Approach

Middle-out Approach

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main objective of a denial-of-service (DoS) attack?

Stealing sensitive information

Gaining unauthorized access

Disrupting normal system functions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is responsible for deciding the data classification level associated with the data?

Data Custodian

Data Owner

Data User

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology