Search Header Logo

Revision 2

Authored by aziana aziz

Computers

9th - 12th Grade

Used 3+ times

Revision 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the CORRECT term related to the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

  Information Confidentiality

Information Integrity

  Information Availability

   Information Security

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Refer to figure below, identify type of security attack in information system.

"Your help desk had informed you that they received an urgent call from the Vice President last night requesting his log on ID and Password. When talking to the VP today, he says that he never made that call"

 

Spoofing

Reply Attack 

Malicious Software

Social Engineering

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the purpose of the Denial-of-Service (DOS) Attack in the information system threat.

Exploit the weakness in the TCP/IP stack

To execute a Trojan on a system.

  Flooding a system so it cannot operate.

To shutdown services by turning them off

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Select the CORRECT security threat that falls into natural disaster class in information security.

Someone tries to steal critical information from company A

A hacker tries to hack into company X database

Heavy storm tore off the roof of IT Department causing flooding in the server room.

Student modifies the password in the lab PC

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the CORRECT type of security threats based on statement below.

   "A worker inside NASA purposely plugs in a USB pen drive into the main server to collect important data every night"

International Threats

Internal Threats

External Threats

Extra Threats

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the CORRECT terminology in cryptographic.

Encryption – The format of the data before being encrypted

Cipher Text – The “scrambled” format of data after being encrypted.

Cryptanalysis – The decryption and analysis of coded, ciphers or encrypted text.

Plain Text – Method by which information is converted into secret code that hide the information true meaning.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the CORRECT folder for file and folder sharing permission based on figure below.

- The folder is shared only with members of the homegroup.

- Homegroup members can only read the contents of the folders.

  

Nobody

Read

Read & Write

Specific People

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?