Search Header Logo

CSC-3350 Review Part 3

Authored by Yahir S

Computers

University

Used 2+ times

CSC-3350 Review Part 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves a disgruntled/rogue employee?

Insider Attack

Lunchtime Attack

Focused Attack

Phishing Atack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack takes place during a small window of opportunity such as during lunch/coffee break?

Insider Attack

Lunchtime Attack

Focused Attack

Phishing Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of physical risk?

The likelihood of financial loss due to market fluctuations
The emotional distress caused by a stressful situation
The probability of winning a game of chance

The likelihood that a computer/network can be exploited

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of physical security?

Physical security is only concerned with securing data
Physical security involves securing virtual locations
Physical security is not necessary for protecting equipment

Physical security is a system of obstacles, safeguards, and procedures o protect people and network data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an RFID tag?

An Radio Frequency Identification tag is a tag that uses electromagnetic and electrostatic coupling to transmit signals.

An Radio Frequency Identification tag is a type of dessert made with chocolate and caramel.

An Radio Frequency Identification tag is a new social media platform for sharing photos and videos.

An Radio Frequency Identification tag is a type of bird species known for its colorful feathers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of wireless protection?

Methods to secure landline telephones.
Measures to protect against physical damage.

Protection of Wi-Fi signal by keeping it private and unusable to unauthorized individuals such as using by security tokens

Security measures for wired networks and devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an NFC tag?

An Near Fields Communication tag is a type of social media platform

An Near Fields Communication tag is a type of fruit

An Near Fields Communication tag is a type of computer software

An Near Fields Communication tag is a tag that uses wireless technology similar to RFID to send and receive data transmissions wirelessly

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?