Cys quiz 1

Cys quiz 1

University

25 Qs

quiz-placeholder

Similar activities

CNIP

CNIP

University

20 Qs

Internet dan Intranet

Internet dan Intranet

8th Grade - University

20 Qs

network security-1

network security-1

12th Grade - University

20 Qs

Understanding Computer Networks

Understanding Computer Networks

University

20 Qs

Net+ vol 2

Net+ vol 2

University

20 Qs

TCP UDP

TCP UDP

University

20 Qs

Pop Quiz - T1 (NDC)

Pop Quiz - T1 (NDC)

University

20 Qs

IT for Managers - M3

IT for Managers - M3

University

20 Qs

Cys quiz 1

Cys quiz 1

Assessment

Quiz

Computers

University

Easy

Created by

Sajjad Al-Sulaiman

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the computer program 'CREEPER' during the 1970s?

Bob kahn

Cristiano Ronaldo

Bob Thomas

Lionel Messi

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Reaper is considered as the first example of ………?

Firewall software

Group policy system

Antimalware software

Antivirus software

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the first firewall program design in response to a computer virus attack?

A NASA researcher

A computer programmer

A network administrator

A cybersecurity expert

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What was the response of governments towards hacking in the early 2000s?

Governments imposed lighter penalties for hacking.

Governments ignored the issue of hacking.

Governments implemented stricter regulations on cybersecurity.


Governments impose serious sentences, including extensive jail time.


5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of Standards for achieving information security?

Access to network resources will be through unique user ID and password.

Passwords will be 10 characters.

Passwords should include one non-alpha and not found in dictionary.

Regular software updates should be performed.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Integrity means keeping sensitive information …….?

Private and secure.

Accessible when needed.

Altered and inconsistent.

Completed and accurate.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following is considered as benefit of information security?

Compliance

Maintenance.

Resistance to change.

Cost.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?