Midterm InfoAsec Review

Midterm InfoAsec Review

University

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

CM - Q4W5 U2L5 - Windows Networks

CM - Q4W5 U2L5 - Windows Networks

10th Grade - University

20 Qs

Quiz No. 3 II-CINS PNetSec (final term)

Quiz No. 3 II-CINS PNetSec (final term)

University

15 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Information Security Lab Quiz # 2

Information Security Lab Quiz # 2

University

15 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

COMP1 (Lesson 3)

COMP1 (Lesson 3)

University

15 Qs

ICT0513 - THE INTERNET & THE WEB (MCQ)

ICT0513 - THE INTERNET & THE WEB (MCQ)

University

15 Qs

Midterm InfoAsec Review

Midterm InfoAsec Review

Assessment

Quiz

Computers

University

Medium

Created by

Jasper Calixtro

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

In the context of networking, ______ refers to any group of users, workstations, devices, printers, computers, and database servers that share different types of data via network resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This covers all the users that have access to the other domains.

User Domain

LAN Domain

WAN Domain

Workstation Domain

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It consists of the Internet and semi-private lines.

User Domain

LAN Domain

WAN Domain

Workstation Domain

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This domain is made up of user-accessed servers such as e-mail and database.

User Domain

System/Application Storage Domain

Remote Access Domain

Workstation Domain

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The __________ domain is defined as a sub-network that is made up of servers and clients.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ refers to the code of responsible behavior on the Internet. The basic rule is “Do not do something in cyberspace that you would consider wrong or illegal in everyday life.”

Cyber Space

Cyber Ethics

Cyber Security

Ethical Hacking

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_________ occurs when any stored data is destroyed. Loss can occur during storage, transmission, or processing.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?