Cys quiz 1

Cys quiz 1

University

25 Qs

quiz-placeholder

Similar activities

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

IT 101 - Quiz 3

IT 101 - Quiz 3

University

20 Qs

NACOS Kahoot Session II

NACOS Kahoot Session II

University

20 Qs

ASD, 3 parte

ASD, 3 parte

University

20 Qs

Chapter 5 Mid Term Quiz - Computer System -

Chapter 5 Mid Term Quiz - Computer System -

5th Grade - University

20 Qs

COA_QUIZ_UNIT I

COA_QUIZ_UNIT I

University

20 Qs

Trắc nghiệm excel - 1

Trắc nghiệm excel - 1

KG - University

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Cys quiz 1

Cys quiz 1

Assessment

Quiz

Computers

University

Easy

Created by

Sajjad Al-Sulaiman

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the computer program 'CREEPER' during the 1970s?

Bob kahn

Cristiano Ronaldo

Bob Thomas

Lionel Messi

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Reaper is considered as the first example of ………?

Firewall software

Group policy system

Antimalware software

Antivirus software

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who created the first firewall program design in response to a computer virus attack?

A NASA researcher

A computer programmer

A network administrator

A cybersecurity expert

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What was the response of governments towards hacking in the early 2000s?

Governments imposed lighter penalties for hacking.

Governments ignored the issue of hacking.

Governments implemented stricter regulations on cybersecurity.


Governments impose serious sentences, including extensive jail time.


5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of Standards for achieving information security?

Access to network resources will be through unique user ID and password.

Passwords will be 10 characters.

Passwords should include one non-alpha and not found in dictionary.

Regular software updates should be performed.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Integrity means keeping sensitive information …….?

Private and secure.

Accessible when needed.

Altered and inconsistent.

Completed and accurate.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the following is considered as benefit of information security?

Compliance

Maintenance.

Resistance to change.

Cost.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?