Lesson 1 - Introduction to Information Security Quiz

Lesson 1 - Introduction to Information Security Quiz

University

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

IQ Test

IQ Test

6th Grade - University

13 Qs

CNET236 Lesson 10, “Configuring Remote Management”

CNET236 Lesson 10, “Configuring Remote Management”

University

10 Qs

Pemasaran Digital Pertanian : E-Commerce (Aplikasi)

Pemasaran Digital Pertanian : E-Commerce (Aplikasi)

University

10 Qs

Internet of Things

Internet of Things

University

10 Qs

Mobilities and Information Technology - Revision 1

Mobilities and Information Technology - Revision 1

University

14 Qs

Post-Test PTEIC Materi Telekomunikasi

Post-Test PTEIC Materi Telekomunikasi

University

20 Qs

CYBER CONCLAVE- ROUND 2

CYBER CONCLAVE- ROUND 2

University

10 Qs

Lesson 1 - Introduction to Information Security Quiz

Lesson 1 - Introduction to Information Security Quiz

Assessment

Quiz

Other

University

Medium

Created by

Robin Arcilla

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Who is the author of the book 'BOOK OF THE FIVE RINGS'?

Roger R. Schell

Dennis MacAlistair Ritchie

Ken Thompson

Miyamoto Musashi

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What was the main use of the ARPANET network?

Military operations

Academic and research purposes

Commercial transactions

Social networking

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Which computer scientist created the C programming language?

Willis Ware

Alan Turing

Dennis MacAlistair Ritchie

Martin Fisher

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What was the purpose of the RAND Report R-609?

To analyze computer security vulnerabilities

To predict the ubiquity of personal computers

To examine the impact of nuclear weapons on military operations

To develop the first digital computer

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is the Enigma machine famous for?

Transmitting coded messages during WWII

Creating the first computer network

Developing the Unix operating system

Designing the first computer with an internally stored program

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is the purpose of the SIPP protocol?

To secure military computer systems

To upgrade internet devices

To provide a platform for new internet functionality

To replace the IPv4 protocol

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Who is known for predicting the ubiquity of personal computers?

Martin Fisher

Ken Thompson

Willis Ware

Nathan Gregory

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?