Information Security 1 UK

Information Security 1 UK

University

10 Qs

quiz-placeholder

Similar activities

Pop Quiz- Abstraction, Algorithm

Pop Quiz- Abstraction, Algorithm

University

14 Qs

AWS ACF Módulo 2 - Economia e Faturamento na Nuvem

AWS ACF Módulo 2 - Economia e Faturamento na Nuvem

University

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

Basic on Operating System

Basic on Operating System

University

10 Qs

Enterprise development - JEE

Enterprise development - JEE

University

10 Qs

Evaluasi Pertemuan 12 DRPL TI-3B

Evaluasi Pertemuan 12 DRPL TI-3B

University

15 Qs

Pythonintro

Pythonintro

University

15 Qs

Information Security 1 UK

Information Security 1 UK

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Cyber Attack is presently affecting millions of computers across more than 150 countries in the world.

Ransomware Cyber Attack

Melissa virus Attack

SQL Injection Attack

Kerberoasting Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA is

Confidentiality, Integrity and Availability

Confidentiality, Independent and Availability

Confidentiality, Integrity and Authentication

Configuration, Integrity and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization in the world is responsible for defining the Standards and protocols for Information Technology, including networking, Security, Communication etc..

IETF: The Internet Engineering Task Force

International Telecommunication Union (ITU);

NIST: National Institute of Standards and Technology

ISO: The International Organization for Standardization (ISO)

All of the Above I.e IETF, ITU, NIST, and ISO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following example of

Tampering with the opinion poll data.

Data associated with the unique ids (e.g. PAN, Aadhar, Driving License) are maliciously changed

is generally Safeguarding ......................................

Availability

Integrity

Confidentiality

Authenticaton

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DOS attack or Denial of Service Attack is a ....................................... type of attack that prevents ......................................................

Active & Availability

Passive & Confidentiality

Active & Integrity

Passive & Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Sender Denies that it send the message or the receiver denies that it received the message is a.............................security attack

Repudiation

Snooping

DOS

Modification

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 25 mod 7

4

3

2

7

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?