Security Concepts Quiz

Security Concepts Quiz

University

20 Qs

quiz-placeholder

Similar activities

Authentication Quiz

Authentication Quiz

11th Grade - University

15 Qs

DSP-Minor1

DSP-Minor1

University

20 Qs

IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

UNIT-V TLS

UNIT-V TLS

University

20 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Cyber Security

Cyber Security

University

23 Qs

Cybersecurity Essentials

Cybersecurity Essentials

9th Grade - University

20 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

Security Concepts Quiz

Security Concepts Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Manicka 2797

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a property of a dependable system?

Availability

Confidentiality

Scalability

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Confidentiality ensures that information is disclosed only to:

All users in the system

Authorized parties

System administrators

External auditors

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of encryption?

To ensure data can only be modified by authorized users

To make data unreadable to unauthorized users

To verify the identity of the sender

To monitor unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security mechanism verifies a claimed identity?

Authentication

Authorization

Encryption

Auditing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a firewall in a secure system?

To prevent all incoming and outgoing traffic

To block all connections by default and allow only permitted ones

To encrypt all network traffic

To monitor and audit data usage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The principle of 'Least Privilege' means:

A user should have access to all system components

A process should run with the fewest possible privileges

Every user must authenticate twice

Only the administrator can access critical resources

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cryptographic process of transforming plaintext into ciphertext is known as:

Decryption

Authentication

Hashing

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?