Cys quiz 1

Cys quiz 1

University

25 Qs

quiz-placeholder

Similar activities

โทโพโลยีเครือข่าย

โทโพโลยีเครือข่าย

University

20 Qs

Topic 2.1.3

Topic 2.1.3

University

20 Qs

Network Topologies, ETC.

Network Topologies, ETC.

University

22 Qs

CN Assignment 2

CN Assignment 2

University

20 Qs

Intro to Data Networking and the Internet - Prelim Exam

Intro to Data Networking and the Internet - Prelim Exam

University

20 Qs

NET101 Practice Set

NET101 Practice Set

University

25 Qs

Networking 2

Networking 2

University

25 Qs

c.i.s.c.o

c.i.s.c.o

University

20 Qs

Cys quiz 1

Cys quiz 1

Assessment

Quiz

Computers

University

Easy

Created by

Sajjad Al-Sulaiman

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the computer program 'CREEPER' during the 1970s?

Bob kahn

Cristiano Ronaldo

Bob Thomas

Lionel Messi

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Reaper is considered as the first example of ………?

Firewall software

Group policy system

Antimalware software

Antivirus software

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the first firewall program design in response to a computer virus attack?

A NASA researcher

A computer programmer

A network administrator

A cybersecurity expert

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What was the response of governments towards hacking in the early 2000s?

Governments imposed lighter penalties for hacking.

Governments ignored the issue of hacking.

Governments implemented stricter regulations on cybersecurity.


Governments impose serious sentences, including extensive jail time.


5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of Standards for achieving information security?

Access to network resources will be through unique user ID and password.

Passwords will be 10 characters.

Passwords should include one non-alpha and not found in dictionary.

Regular software updates should be performed.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Integrity means keeping sensitive information …….?

Private and secure.

Accessible when needed.

Altered and inconsistent.

Completed and accurate.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following is considered as benefit of information security?

Compliance

Maintenance.

Resistance to change.

Cost.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?