
DATA AND NETWORK SECURITY
Authored by Valli S.P
Computers
University
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In security the A in CIA stands for
Authentication
Authorization
Availability
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
__________ is a malicious software designed to block access to a computer system or files until a sum of money is paid
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which encryption method uses a single key for both encryption and decryption, and is often used for secure email communication?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of attack involves intercepting and altering communications between two parties without their knowledge?
Phishing
Man-in-the-middle
Denial of Service
SQL Injection
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a technique used to protect sensitive data by converting it into an unreadable format?
Encoding
Encryption
Compression
Obfuscation
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What does the term "phishing" refer to in the context of cybersecurity?
Method of securing data from unauthorized access.
Technique for improving network performance.
Deceptive attempts to trick individuals into revealing sensitive information
Malicious software that spreads rapidly through a network
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an example of a passive attack?
Data Modification
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?