IT Sec quiz

IT Sec quiz

University

20 Qs

quiz-placeholder

Similar activities

Midterm Examination 1 (Computer Network)

Midterm Examination 1 (Computer Network)

University

15 Qs

Lev6 Spring Term Week 4

Lev6 Spring Term Week 4

12th Grade - University

20 Qs

Exploring ICT in Education

Exploring ICT in Education

University

15 Qs

Bài số 3

Bài số 3

University

15 Qs

 Zamboanga Peninsula/Region IX Quiz

Zamboanga Peninsula/Region IX Quiz

University

15 Qs

childhood apraxia

childhood apraxia

University

20 Qs

infinitives and gerunds

infinitives and gerunds

University

15 Qs

ulangan harian BAB 1

ulangan harian BAB 1

University

20 Qs

IT Sec quiz

IT Sec quiz

Assessment

Quiz

Others

University

Practice Problem

Hard

Created by

infernoxslayerz apple_user

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of confidentiality in the security context?

Ensuring that data is not modified without authorization.

Ensuring that only authorized users can access data.

Ensuring that actions cannot be denied by the subjects who performed them.

Ensuring that data is available when needed.

Ensuring that data is encrypted before being transmitted.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a security goal?

Integrity

Availability

Authenticity

Scalability

Confidentiality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Message Authentication Code (MAC)?

To encrypt data for secure transmission.

To ensure data integrity and authenticity.

To generate a public key for encryption.

To provide anonymity for the sender.

To compress data for faster transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about public-key cryptography?

The same key is used for encryption and decryption.

The public key is used for decryption, and the private key is used for encryption.

The private key is used for decryption, and the public key is used for encryption.

Public-key cryptography is faster than symmetric-key cryptography.

Public-key cryptography does not require key distribution.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using a digital signature?

It ensures data confidentiality.

It provides non-repudiation and authenticity.

It compresses data for faster transmission.

It encrypts data for secure storage.

It allows for anonymous communication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a challenge-response protocol?

To encrypt data for secure transmission.

To verify the identity of a user or system.

To compress data for faster transmission.

To generate a public key for encryption.

To provide anonymity for the sender.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a replay attack?

An attack where the attacker intercepts and retransmits valid data to gain unauthorized access.

An attack where the attacker guesses passwords using a dictionary.

An attack where the attacker modifies data in transit.

An attack where the attacker floods the network with traffic.

An attack where the attacker exploits a buffer overflow vulnerability.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?