
Techno Whiz Level 2
Authored by HANUDEEP GATTU
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Analyze the following example which is a plaintext containing "EPICS" encrypted as "HSLFV" Now find the encrypted text for the word "SECURITY".
VHFYVMVB
UHIXUNWC
VIFYVLUA
VHFXULWB
2.
MATCH QUESTION
20 sec • 1 pt
Arrange the following port numbers in correct order
80
HTTP
21
FTP
25
HTTPS
443
SSH
22
SMTP
3.
MATCH QUESTION
20 sec • 1 pt
Match the Following Attacks..
Spyware
Phishing
Juice Jacking
Ransomeware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Expand the Triad ?
Confidentiality Integrity Availability
Confidentiality Integrity Authentication
Confidentiality Information Availability
Confidentiality Information Accountability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Full form of TCP/IP
Transaction Control Protocol/Internet Protocol
Transmission Control Protocol/Internal Protocol
Transmission Control Protocol/Internet Protocol
Transmission Contribution Protocol/Internet Protocol
6.
CATEGORIZE QUESTION
20 sec • 1 pt
Organize the protocols based on OSI layer
Groups:
(a) Application Layer
,
(b) Transport Layer
TCP
HTTP
FTP
UDP
SMTP
Telnet
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of FireWall?
To protect against physical theft
To Filter and monitor network traffic
To clean and optimise computer files
To enhance the speed of Internet connection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?