
Lecture1-Quiz2 Cybersecurity Awareness (Introduction)
Authored by Vasaka Visoottiviseth
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Chris successfully hacked to a company via a security vulnerability on their website. He did not damage or steal the data but just leave a message to the admin to fix the website bug.
Lucas is considered as what type of hacker?
Black Hat
White Hat
Grey Hat
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which one is NOT in the AAA model?
Access Control
Authentication
Authorization
Accounting
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The AAA model is used to ensure which principles of security?
C
I
A
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which process keeps track of what users do, including what they access?
Encryption
Authentication
Authorization
Accounting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When you enter the hotel room by using the access card, this one is considered as authentication by using which of the below?
What You Know
What You Have
What You Are
What You Feel
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The One-Time-Password (OTP) you got via an SMS is considered as authentication by which one?
What You Know
What You Have
What You Are
What You See
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Hashing is used to protect which principles of security?
C
I
A
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?