CYBER CHALLANGES'24 QUIZ BATCH 1

CYBER CHALLANGES'24 QUIZ BATCH 1

University

20 Qs

quiz-placeholder

Similar activities

OperationsManagementMCQ1

OperationsManagementMCQ1

University

20 Qs

UAS TRANSFORMDIGI

UAS TRANSFORMDIGI

University

16 Qs

QUIZ TIK EXCEL

QUIZ TIK EXCEL

10th Grade - University

25 Qs

IntroductionDatabases

IntroductionDatabases

University

20 Qs

UTS Digimin FEB

UTS Digimin FEB

University

20 Qs

G4-Microprocessors and Their Uses

G4-Microprocessors and Their Uses

4th Grade - University

15 Qs

Uji Pengetahuan Teknologi Informasi

Uji Pengetahuan Teknologi Informasi

9th Grade - University

20 Qs

The Linux Vault

The Linux Vault

University

15 Qs

CYBER CHALLANGES'24 QUIZ BATCH 1

CYBER CHALLANGES'24 QUIZ BATCH 1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Santhoshkumar M

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

PCT Stands for________

Private Communication Technique

Private Connection Technology

Private Communication Technology

Personal Communication Technology

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a Trojan horse in computer security?

Software used for data recovery

A program that seems legitimate but damages the system

Antivirus software

A type of malware that replicates itself

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does data encryption involve?

Encoding data into a secret code

Converting data into a human-readable format

Compressing data to save storage space

Deleting data permanently from storage

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the security of data from tampering by unidentified users ?

Confidentiality

Integrity

Authentication

Non-repudiation

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which one of the following can be considered as the class of computer threats?

Dos Attack

Phishing

Soliciting

Both A and C

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A coffee shop that collects payments from customers by debit / credit cards would be liable under the data privacy.

True

False

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the primary purpose of a firewall?

To monitor and control incoming and outgoing network traffic

To encrypt data

To store backups

to manage the passwords

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?